Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-7668 (GCVE-0-2017-7668)
Vulnerability from cvelistv5
Published
2017-06-20 01:00
Modified
2024-08-05 16:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-126 - Denial of Service, Integrity Violation ()
Summary
The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache HTTP Server |
Version: 2.2.32 Version: 2.4.24, 2.4.25 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:12:28.098Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT208221" }, { "name": "RHSA-2017:2479", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2479" }, { "name": "[dev] 20170619 CVE-2017-7668: ap_find_token buffer overread", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/55a068b6a5eec0b3198ae7d96a7cb412352d0ffa7716612c5af3745b%40%3Cdev.httpd.apache.org%3E" }, { "name": "RHSA-2017:2483", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2483" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180601-0002/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03821en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "99137", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99137" }, { "name": "DSA-3896", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3896" }, { "name": "RHSA-2017:3194", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:3194" }, { "name": "RHSA-2017:3193", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:3193" }, { "name": "1038711", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038711" }, { "name": "GLSA-201710-32", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201710-32" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.tenable.com/security/tns-2019-09" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache HTTP Server", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "2.2.32" }, { "status": "affected", "version": "2.4.24, 2.4.25" } ] } ], "datePublic": "2017-06-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-126", "description": "Denial of Service, Integrity Violation (CWE-126)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-06T10:12:02", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT208221" }, { "name": "RHSA-2017:2479", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2479" }, { "name": "[dev] 20170619 CVE-2017-7668: ap_find_token buffer overread", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/55a068b6a5eec0b3198ae7d96a7cb412352d0ffa7716612c5af3745b%40%3Cdev.httpd.apache.org%3E" }, { "name": "RHSA-2017:2483", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2483" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180601-0002/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03821en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "99137", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99137" }, { "name": "DSA-3896", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3896" }, { "name": "RHSA-2017:3194", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:3194" }, { "name": "RHSA-2017:3193", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:3193" }, { "name": "1038711", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038711" }, { "name": "GLSA-201710-32", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201710-32" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.tenable.com/security/tns-2019-09" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2017-7668", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache HTTP Server", "version": { "version_data": [ { "version_value": "2.2.32" }, { "version_value": "2.4.24, 2.4.25" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service, Integrity Violation (CWE-126)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/HT208221", "refsource": "CONFIRM", "url": "https://support.apple.com/HT208221" }, { "name": "RHSA-2017:2479", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2479" }, { "name": "[dev] 20170619 CVE-2017-7668: ap_find_token buffer overread", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/55a068b6a5eec0b3198ae7d96a7cb412352d0ffa7716612c5af3745b@%3Cdev.httpd.apache.org%3E" }, { "name": "RHSA-2017:2483", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2483" }, { "name": "https://security.netapp.com/advisory/ntap-20180601-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180601-0002/" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03821en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03821en_us" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "99137", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99137" }, { "name": "DSA-3896", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3896" }, { "name": "RHSA-2017:3194", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3194" }, { "name": "RHSA-2017:3193", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3193" }, { "name": "1038711", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038711" }, { "name": "GLSA-201710-32", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201710-32" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E" }, { "name": "https://www.tenable.com/security/tns-2019-09", "refsource": "CONFIRM", "url": "https://www.tenable.com/security/tns-2019-09" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-7668", "datePublished": "2017-06-20T01:00:00", "dateReserved": "2017-04-11T00:00:00", "dateUpdated": "2024-08-05T16:12:28.098Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-7668\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2017-06-20T01:29:00.390\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.\"},{\"lang\":\"es\",\"value\":\"Los cambios en el an\u00e1lisis sint\u00e1ctico estricto de HTTP a\u00f1adidos en las versiones 2.2.32 y 2.4.24 de Apache httpd introdujeron un error en el an\u00e1lisis de listas de tokens. Esto permite que ap_find_token() busque m\u00e1s all\u00e1 del final de la cadena de entrada. Un atacante puede conseguir causar un fallo de segmentaci\u00f3n o forzar a que ap_find_token() devuelva un valor incorrecto mediante la manipulaci\u00f3n de una secuencia de cabeceras de peticiones con fines maliciosos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-126\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"020254C9-BA4E-4705-A967-ABD498722C99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD2AC773-59A1-46EB-8943-309ADF012435\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5673AB-53BB-40B2-83A7-8B82B2D0EBB8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FE996B1-6951-4F85-AA58-B99A379D2163\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*\",\"matchCriteriaId\":\"3FA5E22C-489B-4C5F-A5F3-C03F45CA8811\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ADFF451-740F-4DBA-BD23-3881945D3E40\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE1D81A1-CD24-4B17-8AFD-DC95E90AD7D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"807C024A-F8E8-4B48-A349-4C68CD252CA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F96E3779-F56A-45FF-BB3D-4980527D721E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CF73560-2F5B-4723-A8A1-9AADBB3ADA00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BF3C7A5-9117-42C7-BEA1-4AA378A582EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83737173-E12E-4641-BC49-0BD84A6B29D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C8D871B-AEA1-4407-AEE3-47EC782250FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98381E61-F082-4302-B51F-5648884F998B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99A687E-EAE6-417E-A88E-D0082BC194CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B353CE99-D57C-465B-AAB0-73EF581127D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7431ABC1-9252-419E-8CC1-311B41360078\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6755B6AD-0422-467B-8115-34A60B1D1A40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5F7E11E-FB34-4467-8919-2B6BEAABF665\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17F256A9-D3B9-4C72-B013-4EFD878BFEA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:secure_global_desktop:5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B4B4E96-1F12-4719-BDB7-4ED5D3DCF9ED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.13.1\",\"matchCriteriaId\":\"C43CA59D-847F-4225-A7A6-02DEB1BB4F64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.11.0\",\"versionEndExcluding\":\"10.11.6\",\"matchCriteriaId\":\"591A337B-D469-4080-BEC6-5ED9523EFC92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.12.0\",\"versionEndExcluding\":\"10.12.6\",\"matchCriteriaId\":\"97AA7714-48CD-4249-9968-81C9781B1102\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.11.6:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B7FC88F-6216-480F-A27D-9A2D2D8F3034\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.11.6:security_update_2016-001:*:*:*:*:*:*\",\"matchCriteriaId\":\"C47360D3-4390-4F31-BA82-7A4F38408E68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.11.6:security_update_2016-002:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB1158A-9D65-463A-A8AF-D946E95EB2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.11.6:security_update_2016-003:*:*:*:*:*:*\",\"matchCriteriaId\":\"28B4E7A2-3022-4B23-A068-FFE58C3A449B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.11.6:security_update_2017-001:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE0F7C4-53B7-4554-8F4D-AAB417A1569F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.11.6:security_update_2017-002:*:*:*:*:*:*\",\"matchCriteriaId\":\"C03A4DED-974B-4FCE-92F7-83DA939E0847\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.11.6:security_update_2017-003:*:*:*:*:*:*\",\"matchCriteriaId\":\"47EF9186-8EBD-441B-B2DD-FB18C072EEBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.12.6:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"6536473A-2ECF-4806-AC02-2386552BEAB1\"}]}]}],\"references\":[{\"url\":\"http://www.debian.org/security/2017/dsa-3896\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html\",\"source\":\"security@apache.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/99137\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038711\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2479\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2483\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3193\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3194\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/55a068b6a5eec0b3198ae7d96a7cb412352d0ffa7716612c5af3745b%40%3Cdev.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://security.gentoo.org/glsa/201710-32\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180601-0002/\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/HT208221\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03821en_us\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2019-09\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2017/dsa-3896\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/99137\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038711\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2479\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2483\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3193\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3194\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/55a068b6a5eec0b3198ae7d96a7cb412352d0ffa7716612c5af3745b%40%3Cdev.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201710-32\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180601-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/HT208221\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03821en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2019-09\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2017:3194
Vulnerability from csaf_redhat
Published
2017-11-13 17:36
Modified
2025-08-03 17:30
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)
* It was discovered that the use of httpd's ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)
* A NULL pointer dereference flaw was found in the httpd's mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)
* A buffer over-read flaw was found in the httpd's ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)
* A buffer over-read flaw was found in the httpd's mod_mime module. A user permitted to modify httpd's MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)
* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)
Red Hat would like to thank Hanno Böck for reporting CVE-2017-9798.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank Hanno B\u00f6ck for reporting CVE-2017-9798.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:3194", "url": "https://access.redhat.com/errata/RHSA-2017:3194" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1463194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194" }, { "category": "external", "summary": "1463197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197" }, { "category": "external", "summary": "1463205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205" }, { "category": "external", "summary": "1463207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207" }, { "category": "external", "summary": "1470748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748" }, { "category": "external", "summary": "1490344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3194.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-08-03T17:30:31+00:00", "generator": { "date": "2025-08-03T17:30:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:3194", "initial_release_date": "2017-11-13T17:36:28+00:00", "revision_history": [ { "date": "2017-11-13T17:36:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-11-13T17:36:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T17:30:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "product": { "name": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "product_id": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "product_id": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-45.el7_3.5.x86_64", "product": { "name": "mod_session-0:2.4.6-45.el7_3.5.x86_64", "product_id": "mod_session-0:2.4.6-45.el7_3.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "product": { "name": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "product_id": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "product": { "name": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "product_id": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-0:2.4.6-45.el7_3.5.x86_64", "product": { "name": "httpd-0:2.4.6-45.el7_3.5.x86_64", "product_id": "httpd-0:2.4.6-45.el7_3.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "product": { "name": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "product_id": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "product": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-45.el7_3.5.s390x", "product": { "name": "mod_ldap-0:2.4.6-45.el7_3.5.s390x", "product_id": "mod_ldap-0:2.4.6-45.el7_3.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "product": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "product_id": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-45.el7_3.5.s390x", "product": { "name": "mod_session-0:2.4.6-45.el7_3.5.s390x", "product_id": "mod_session-0:2.4.6-45.el7_3.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-45.el7_3.5.s390x", "product": { "name": "mod_ssl-1:2.4.6-45.el7_3.5.s390x", "product_id": "mod_ssl-1:2.4.6-45.el7_3.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-45.el7_3.5.s390x", "product": { "name": "httpd-tools-0:2.4.6-45.el7_3.5.s390x", "product_id": "httpd-tools-0:2.4.6-45.el7_3.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.5?arch=s390x" } } }, { "category": "product_version", "name": "httpd-0:2.4.6-45.el7_3.5.s390x", "product": { "name": "httpd-0:2.4.6-45.el7_3.5.s390x", "product_id": "httpd-0:2.4.6-45.el7_3.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.5?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-45.el7_3.5.s390x", "product": { "name": "httpd-devel-0:2.4.6-45.el7_3.5.s390x", "product_id": "httpd-devel-0:2.4.6-45.el7_3.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "product": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.5?arch=ppc64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "product": { "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "product_id": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.5?arch=ppc64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "product": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "product_id": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64", "product": { "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64", "product_id": "mod_session-0:2.4.6-45.el7_3.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.5?arch=ppc64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "product": { "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "product_id": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "product": { "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "product_id": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.5?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-0:2.4.6-45.el7_3.5.ppc64", "product": { "name": "httpd-0:2.4.6-45.el7_3.5.ppc64", "product_id": "httpd-0:2.4.6-45.el7_3.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.5?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "product": { "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "product_id": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "product": { "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "product_id": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "product_id": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64le", "product": { "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64le", "product_id": "mod_session-0:2.4.6-45.el7_3.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "product": { "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "product_id": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "product": { "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "product_id": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.5?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-0:2.4.6-45.el7_3.5.ppc64le", "product": { "name": "httpd-0:2.4.6-45.el7_3.5.ppc64le", "product_id": "httpd-0:2.4.6-45.el7_3.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.5?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "product": { "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "product_id": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.5?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-45.el7_3.5.noarch", "product": { "name": "httpd-manual-0:2.4.6-45.el7_3.5.noarch", "product_id": "httpd-manual-0:2.4.6-45.el7_3.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-45.el7_3.5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-45.el7_3.5.src", "product": { "name": "httpd-0:2.4.6-45.el7_3.5.src", "product_id": "httpd-0:2.4.6-45.el7_3.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x" }, "product_reference": "httpd-0:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.5.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src" }, "product_reference": "httpd-0:2.4.6-45.el7_3.5.src", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "httpd-0:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x" }, "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-45.el7_3.5.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch" }, "product_reference": "httpd-manual-0:2.4.6-45.el7_3.5.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x" }, "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x" }, "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x" }, "product_reference": "mod_session-0:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "mod_session-0:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x" }, "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x" }, "product_reference": "httpd-0:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.5.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src" }, "product_reference": "httpd-0:2.4.6-45.el7_3.5.src", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "httpd-0:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x" }, "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-45.el7_3.5.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch" }, "product_reference": "httpd-manual-0:2.4.6-45.el7_3.5.noarch", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x" }, "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x" }, "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x" }, "product_reference": "mod_session-0:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "mod_session-0:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x" }, "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x" }, "product_reference": "httpd-0:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.5.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src" }, "product_reference": "httpd-0:2.4.6-45.el7_3.5.src", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "httpd-0:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x" }, "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-45.el7_3.5.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch" }, "product_reference": "httpd-manual-0:2.4.6-45.el7_3.5.noarch", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x" }, "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x" }, "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x" }, "product_reference": "mod_session-0:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "mod_session-0:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x" }, "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-3167", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463194" } ], "notes": [ { "category": "description", "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: ap_get_basic_auth_pw() authentication bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3167" }, { "category": "external", "summary": "RHBZ#1463194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-11-13T17:36:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3194" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: ap_get_basic_auth_pw() authentication bypass" }, { "cve": "CVE-2017-3169", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463197" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_ssl NULL pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3169" }, { "category": "external", "summary": "RHBZ#1463197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-11-13T17:36:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3194" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_ssl NULL pointer dereference" }, { "cve": "CVE-2017-7668", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463205" } ], "notes": [ { "category": "description", "text": "A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: ap_find_token() buffer overread", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7668" }, { "category": "external", "summary": "RHBZ#1463205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7668", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-11-13T17:36:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3194" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: ap_find_token() buffer overread" }, { "cve": "CVE-2017-7679", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463207" } ], "notes": [ { "category": "description", "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_mime buffer overread", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7679" }, { "category": "external", "summary": "RHBZ#1463207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-11-13T17:36:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3194" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_mime buffer overread" }, { "cve": "CVE-2017-9788", "cwe": { "id": "CWE-456", "name": "Missing Initialization of a Variable" }, "discovery_date": "2017-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1470748" } ], "notes": [ { "category": "description", "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Uninitialized memory reflection in mod_auth_digest", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9788" }, { "category": "external", "summary": "RHBZ#1470748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34", "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27" } ], "release_date": "2017-07-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-11-13T17:36:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3194" }, { "category": "workaround", "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.", "product_ids": [ "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Uninitialized memory reflection in mod_auth_digest" }, { "acknowledgments": [ { "names": [ "Hanno B\u00f6ck" ] } ], "cve": "CVE-2017-9798", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-09-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1490344" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9798" }, { "category": "external", "summary": "RHBZ#1490344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798" }, { "category": "external", "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html", "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html" } ], "release_date": "2017-09-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-11-13T17:36:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3194" }, { "category": "workaround", "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18", "product_ids": [ "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src", "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x", "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)" } ] }
rhsa-2017:2479
Vulnerability from csaf_redhat
Published
2017-08-15 18:23
Modified
2025-08-03 17:29
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)
* It was discovered that the use of httpd's ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)
* A NULL pointer dereference flaw was found in the httpd's mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)
* A buffer over-read flaw was found in the httpd's ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)
* A buffer over-read flaw was found in the httpd's mod_mime module. A user permitted to modify httpd's MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:2479", "url": "https://access.redhat.com/errata/RHSA-2017:2479" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1463194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194" }, { "category": "external", "summary": "1463197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197" }, { "category": "external", "summary": "1463205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205" }, { "category": "external", "summary": "1463207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207" }, { "category": "external", "summary": "1470748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2479.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-08-03T17:29:30+00:00", "generator": { "date": "2025-08-03T17:29:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:2479", "initial_release_date": "2017-08-15T18:23:44+00:00", "revision_history": [ { "date": "2017-08-15T18:23:44+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-08-15T18:23:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T17:29:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "product": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "product_id": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-67.el7_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "product": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "product_id": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-67.el7_4.2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "product": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "product_id": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-67.el7_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-0:2.4.6-67.el7_4.2.x86_64", "product": { "name": "httpd-0:2.4.6-67.el7_4.2.x86_64", "product_id": "httpd-0:2.4.6-67.el7_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64", "product": { "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64", "product_id": "mod_session-0:2.4.6-67.el7_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-67.el7_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "product": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "product_id": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch", "product": { "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch", "product_id": "httpd-manual-0:2.4.6-67.el7_4.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-67.el7_4.2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-67.el7_4.2.src", "product": { "name": "httpd-0:2.4.6-67.el7_4.2.src", "product_id": "httpd-0:2.4.6-67.el7_4.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x", "product": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x", "product_id": "httpd-devel-0:2.4.6-67.el7_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-67.el7_4.2?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x", "product": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x", "product_id": "mod_ssl-1:2.4.6-67.el7_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-67.el7_4.2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "product": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x", "product": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x", "product_id": "httpd-tools-0:2.4.6-67.el7_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-67.el7_4.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd-0:2.4.6-67.el7_4.2.s390x", "product": { "name": "httpd-0:2.4.6-67.el7_4.2.s390x", "product_id": "httpd-0:2.4.6-67.el7_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.2?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-67.el7_4.2.s390x", "product": { "name": "mod_session-0:2.4.6-67.el7_4.2.s390x", "product_id": "mod_session-0:2.4.6-67.el7_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-67.el7_4.2?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "product": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x", "product": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x", "product_id": "mod_ldap-0:2.4.6-67.el7_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "product": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "product_id": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-67.el7_4.2?arch=ppc64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "product": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "product_id": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-67.el7_4.2?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "product": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.2?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "product": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "product_id": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-67.el7_4.2?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-0:2.4.6-67.el7_4.2.ppc64", "product": { "name": "httpd-0:2.4.6-67.el7_4.2.ppc64", "product_id": "httpd-0:2.4.6-67.el7_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.2?arch=ppc64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64", "product": { "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64", "product_id": "mod_session-0:2.4.6-67.el7_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-67.el7_4.2?arch=ppc64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "product": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.2?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "product": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "product_id": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.2?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "product": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "product_id": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-67.el7_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "product": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "product_id": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-67.el7_4.2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "product": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "product_id": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-67.el7_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le", "product": { "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le", "product_id": "httpd-0:2.4.6-67.el7_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le", "product": { "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le", "product_id": "mod_session-0:2.4.6-67.el7_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-67.el7_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "product": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "product_id": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "product": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.2?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "product": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "product_id": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.src", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch" }, "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.src", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch" }, "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.src", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch" }, "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.src", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch" }, "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.src", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch" }, "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.src", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch" }, "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-3167", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463194" } ], "notes": [ { "category": "description", "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: ap_get_basic_auth_pw() authentication bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3167" }, { "category": "external", "summary": "RHBZ#1463194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-15T18:23:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2479" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: ap_get_basic_auth_pw() authentication bypass" }, { "cve": "CVE-2017-3169", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463197" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_ssl NULL pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3169" }, { "category": "external", "summary": "RHBZ#1463197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-15T18:23:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2479" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_ssl NULL pointer dereference" }, { "cve": "CVE-2017-7668", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463205" } ], "notes": [ { "category": "description", "text": "A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: ap_find_token() buffer overread", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7668" }, { "category": "external", "summary": "RHBZ#1463205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7668", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-15T18:23:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2479" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: ap_find_token() buffer overread" }, { "cve": "CVE-2017-7679", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463207" } ], "notes": [ { "category": "description", "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_mime buffer overread", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7679" }, { "category": "external", "summary": "RHBZ#1463207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-15T18:23:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2479" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_mime buffer overread" }, { "cve": "CVE-2017-9788", "cwe": { "id": "CWE-456", "name": "Missing Initialization of a Variable" }, "discovery_date": "2017-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1470748" } ], "notes": [ { "category": "description", "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Uninitialized memory reflection in mod_auth_digest", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9788" }, { "category": "external", "summary": "RHBZ#1470748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34", "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27" } ], "release_date": "2017-07-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-15T18:23:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2479" }, { "category": "workaround", "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.", "product_ids": [ "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src", "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x", "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Uninitialized memory reflection in mod_auth_digest" } ] }
rhsa-2017:3193
Vulnerability from csaf_redhat
Published
2017-11-13 17:35
Modified
2025-08-03 17:30
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 7.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)
* It was discovered that the use of httpd's ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)
* A NULL pointer dereference flaw was found in the httpd's mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)
* A buffer over-read flaw was found in the httpd's ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)
* A buffer over-read flaw was found in the httpd's mod_mime module. A user permitted to modify httpd's MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)
* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)
Red Hat would like to thank Hanno Böck for reporting CVE-2017-9798.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank Hanno B\u00f6ck for reporting CVE-2017-9798.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:3193", "url": "https://access.redhat.com/errata/RHSA-2017:3193" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1463194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194" }, { "category": "external", "summary": "1463197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197" }, { "category": "external", "summary": "1463205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205" }, { "category": "external", "summary": "1463207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207" }, { "category": "external", "summary": "1470748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748" }, { "category": "external", "summary": "1490344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3193.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-08-03T17:30:26+00:00", "generator": { "date": "2025-08-03T17:30:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:3193", "initial_release_date": "2017-11-13T17:35:40+00:00", "revision_history": [ { "date": "2017-11-13T17:35:40+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-11-13T17:35:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T17:30:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.2::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.2::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-40.el7_2.6?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-40.el7_2.6.x86_64", "product": { "name": "mod_session-0:2.4.6-40.el7_2.6.x86_64", "product_id": "mod_session-0:2.4.6-40.el7_2.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-40.el7_2.6?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "product_id": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-40.el7_2.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "product": { "name": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "product_id": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-40.el7_2.6?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "product": { "name": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "product_id": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-40.el7_2.6?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "product": { "name": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "product_id": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-40.el7_2.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "product": { "name": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "product_id": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-40.el7_2.6?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-0:2.4.6-40.el7_2.6.x86_64", "product": { "name": "httpd-0:2.4.6-40.el7_2.6.x86_64", "product_id": "httpd-0:2.4.6-40.el7_2.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "product": { "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "product_id": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-40.el7_2.6?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-40.el7_2.6.s390x", "product": { "name": "mod_session-0:2.4.6-40.el7_2.6.s390x", "product_id": "mod_session-0:2.4.6-40.el7_2.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-40.el7_2.6?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "product": { "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "product_id": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-40.el7_2.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-40.el7_2.6.s390x", "product": { "name": "mod_ldap-0:2.4.6-40.el7_2.6.s390x", "product_id": "mod_ldap-0:2.4.6-40.el7_2.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-40.el7_2.6?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-40.el7_2.6.s390x", "product": { "name": "httpd-tools-0:2.4.6-40.el7_2.6.s390x", "product_id": "httpd-tools-0:2.4.6-40.el7_2.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-40.el7_2.6?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-40.el7_2.6.s390x", "product": { "name": "mod_ssl-1:2.4.6-40.el7_2.6.s390x", "product_id": "mod_ssl-1:2.4.6-40.el7_2.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-40.el7_2.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-40.el7_2.6.s390x", "product": { "name": "httpd-devel-0:2.4.6-40.el7_2.6.s390x", "product_id": "httpd-devel-0:2.4.6-40.el7_2.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-40.el7_2.6?arch=s390x" } } }, { "category": "product_version", "name": "httpd-0:2.4.6-40.el7_2.6.s390x", "product": { "name": "httpd-0:2.4.6-40.el7_2.6.s390x", "product_id": "httpd-0:2.4.6-40.el7_2.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "product": { "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "product_id": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-40.el7_2.6?arch=ppc64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64", "product": { "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64", "product_id": "mod_session-0:2.4.6-40.el7_2.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-40.el7_2.6?arch=ppc64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "product": { "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "product_id": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-40.el7_2.6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "product": { "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "product_id": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-40.el7_2.6?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "product": { "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "product_id": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-40.el7_2.6?arch=ppc64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "product": { "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "product_id": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-40.el7_2.6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "product": { "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "product_id": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-40.el7_2.6?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-0:2.4.6-40.el7_2.6.ppc64", "product": { "name": "httpd-0:2.4.6-40.el7_2.6.ppc64", "product_id": "httpd-0:2.4.6-40.el7_2.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "product_id": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-40.el7_2.6?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64le", "product": { "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64le", "product_id": "mod_session-0:2.4.6-40.el7_2.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-40.el7_2.6?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "product_id": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-40.el7_2.6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "product": { "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "product_id": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-40.el7_2.6?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "product": { "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "product_id": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-40.el7_2.6?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "product": { "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "product_id": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-40.el7_2.6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "product": { "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "product_id": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-40.el7_2.6?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-0:2.4.6-40.el7_2.6.ppc64le", "product": { "name": "httpd-0:2.4.6-40.el7_2.6.ppc64le", "product_id": "httpd-0:2.4.6-40.el7_2.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.6?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-40.el7_2.6.src", "product": { "name": "httpd-0:2.4.6-40.el7_2.6.src", "product_id": "httpd-0:2.4.6-40.el7_2.6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-40.el7_2.6.noarch", "product": { "name": "httpd-manual-0:2.4.6-40.el7_2.6.noarch", "product_id": "httpd-manual-0:2.4.6-40.el7_2.6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-40.el7_2.6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x" }, "product_reference": "httpd-0:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-40.el7_2.6.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src" }, "product_reference": "httpd-0:2.4.6-40.el7_2.6.src", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "httpd-0:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x" }, "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-40.el7_2.6.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch" }, "product_reference": "httpd-manual-0:2.4.6-40.el7_2.6.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x" }, "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x" }, "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x" }, "product_reference": "mod_session-0:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "mod_session-0:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x" }, "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x" }, "product_reference": "httpd-0:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-40.el7_2.6.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src" }, "product_reference": "httpd-0:2.4.6-40.el7_2.6.src", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "httpd-0:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x" }, "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-40.el7_2.6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch" }, "product_reference": "httpd-manual-0:2.4.6-40.el7_2.6.noarch", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x" }, "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x" }, "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x" }, "product_reference": "mod_session-0:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "mod_session-0:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x" }, "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x" }, "product_reference": "httpd-0:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-40.el7_2.6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src" }, "product_reference": "httpd-0:2.4.6-40.el7_2.6.src", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "httpd-0:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x" }, "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-40.el7_2.6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch" }, "product_reference": "httpd-manual-0:2.4.6-40.el7_2.6.noarch", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x" }, "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x" }, "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x" }, "product_reference": "mod_session-0:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "mod_session-0:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x" }, "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.s390x", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "relates_to_product_reference": "7Server-optional-7.2.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-3167", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463194" } ], "notes": [ { "category": "description", "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: ap_get_basic_auth_pw() authentication bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3167" }, { "category": "external", "summary": "RHBZ#1463194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-11-13T17:35:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3193" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: ap_get_basic_auth_pw() authentication bypass" }, { "cve": "CVE-2017-3169", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463197" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_ssl NULL pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3169" }, { "category": "external", "summary": "RHBZ#1463197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-11-13T17:35:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3193" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_ssl NULL pointer dereference" }, { "cve": "CVE-2017-7668", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463205" } ], "notes": [ { "category": "description", "text": "A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: ap_find_token() buffer overread", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7668" }, { "category": "external", "summary": "RHBZ#1463205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7668", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-11-13T17:35:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3193" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: ap_find_token() buffer overread" }, { "cve": "CVE-2017-7679", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463207" } ], "notes": [ { "category": "description", "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_mime buffer overread", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7679" }, { "category": "external", "summary": "RHBZ#1463207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-11-13T17:35:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3193" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_mime buffer overread" }, { "cve": "CVE-2017-9788", "cwe": { "id": "CWE-456", "name": "Missing Initialization of a Variable" }, "discovery_date": "2017-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1470748" } ], "notes": [ { "category": "description", "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Uninitialized memory reflection in mod_auth_digest", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9788" }, { "category": "external", "summary": "RHBZ#1470748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34", "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27" } ], "release_date": "2017-07-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-11-13T17:35:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3193" }, { "category": "workaround", "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.", "product_ids": [ "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Uninitialized memory reflection in mod_auth_digest" }, { "acknowledgments": [ { "names": [ "Hanno B\u00f6ck" ] } ], "cve": "CVE-2017-9798", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-09-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1490344" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9798" }, { "category": "external", "summary": "RHBZ#1490344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798" }, { "category": "external", "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html", "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html" } ], "release_date": "2017-09-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-11-13T17:35:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3193" }, { "category": "workaround", "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18", "product_ids": [ "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src", "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x", "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)" } ] }
rhsa-2017:2483
Vulnerability from csaf_redhat
Published
2017-08-16 23:04
Modified
2025-08-03 17:29
Summary
Red Hat Security Advisory: httpd24-httpd security update
Notes
Topic
An update for httpd24-httpd is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)
* It was discovered that the use of httpd's ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)
* A NULL pointer dereference flaw was found in the httpd's mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)
* A NULL pointer dereference flaw was found in the mod_http2 module of httpd. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP/2 request. (CVE-2017-7659)
* A buffer over-read flaw was found in the httpd's ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)
* A buffer over-read flaw was found in the httpd's mod_mime module. A user permitted to modify httpd's MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd24-httpd is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A NULL pointer dereference flaw was found in the mod_http2 module of httpd. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP/2 request. (CVE-2017-7659)\n\n* A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:2483", "url": "https://access.redhat.com/errata/RHSA-2017:2483" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1463194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194" }, { "category": "external", "summary": "1463197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197" }, { "category": "external", "summary": "1463199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463199" }, { "category": "external", "summary": "1463205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205" }, { "category": "external", "summary": "1463207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207" }, { "category": "external", "summary": "1470748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2483.json" } ], "title": "Red Hat Security Advisory: httpd24-httpd security update", "tracking": { "current_release_date": "2025-08-03T17:29:36+00:00", "generator": { "date": "2025-08-03T17:29:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:2483", "initial_release_date": "2017-08-16T23:04:17+00:00", "revision_history": [ { "date": "2017-08-16T23:04:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-08-16T23:04:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T17:29:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "product_id": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.25-9.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "product": { "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "product_id": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.25-9.el7.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "product": { "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "product_id": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.25-9.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "product": { "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "product_id": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.25-9.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "product": { "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "product_id": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.25-9.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "product": { "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "product_id": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "product": { "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "product_id": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.25-9.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "product": { "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "product_id": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.25-9.el7.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "product": { "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "product_id": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.25-9.el6.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "product": { "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "product_id": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.25-9.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "product": { "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "product_id": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.25-9.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "product": { "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "product_id": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "product": { "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "product_id": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.25-9.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "product": { "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "product_id": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.25-9.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "product": { "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "product_id": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.25-9.el6.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "product_id": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.25-9.el6.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "product": { "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "product_id": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.25-9.el7.1?arch=noarch" } } }, { "category": "product_version", "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "product": { "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "product_id": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.25-9.el6.1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-0:2.4.25-9.el7.1.src", "product": { "name": "httpd24-httpd-0:2.4.25-9.el7.1.src", "product_id": "httpd24-httpd-0:2.4.25-9.el7.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el7.1?arch=src" } } }, { "category": "product_version", "name": "httpd24-httpd-0:2.4.25-9.el6.1.src", "product": { "name": "httpd24-httpd-0:2.4.25-9.el6.1.src", "product_id": "httpd24-httpd-0:2.4.25-9.el6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el6.1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.src", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.src", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.src", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.src", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-3167", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463194" } ], "notes": [ { "category": "description", "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: ap_get_basic_auth_pw() authentication bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3167" }, { "category": "external", "summary": "RHBZ#1463194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-16T23:04:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2483" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: ap_get_basic_auth_pw() authentication bypass" }, { "cve": "CVE-2017-3169", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463197" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_ssl NULL pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3169" }, { "category": "external", "summary": "RHBZ#1463197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-16T23:04:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2483" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_ssl NULL pointer dereference" }, { "cve": "CVE-2017-7659", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463199" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the mod_http2 module of httpd. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP/2 request.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_http2 NULL pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7659" }, { "category": "external", "summary": "RHBZ#1463199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463199" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7659", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7659" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7659", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7659" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-16T23:04:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2483" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_http2 NULL pointer dereference" }, { "cve": "CVE-2017-7668", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463205" } ], "notes": [ { "category": "description", "text": "A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: ap_find_token() buffer overread", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7668" }, { "category": "external", "summary": "RHBZ#1463205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7668", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-16T23:04:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2483" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: ap_find_token() buffer overread" }, { "cve": "CVE-2017-7679", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463207" } ], "notes": [ { "category": "description", "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_mime buffer overread", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7679" }, { "category": "external", "summary": "RHBZ#1463207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-16T23:04:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2483" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_mime buffer overread" }, { "cve": "CVE-2017-9788", "cwe": { "id": "CWE-456", "name": "Missing Initialization of a Variable" }, "discovery_date": "2017-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1470748" } ], "notes": [ { "category": "description", "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Uninitialized memory reflection in mod_auth_digest", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9788" }, { "category": "external", "summary": "RHBZ#1470748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34", "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27" } ], "release_date": "2017-07-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-16T23:04:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2483" }, { "category": "workaround", "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.", "product_ids": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src", "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch", "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64", "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src", "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch", "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64", "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Uninitialized memory reflection in mod_auth_digest" } ] }
fkie_cve-2017-7668
Vulnerability from fkie_nvd
Published
2017-06-20 01:29
Modified
2025-04-20 01:37
Severity ?
Summary
The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | http://www.debian.org/security/2017/dsa-3896 | Third Party Advisory | |
security@apache.org | http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html | Patch, Third Party Advisory | |
security@apache.org | http://www.securityfocus.com/bid/99137 | Third Party Advisory, VDB Entry | |
security@apache.org | http://www.securitytracker.com/id/1038711 | Third Party Advisory, VDB Entry | |
security@apache.org | https://access.redhat.com/errata/RHSA-2017:2479 | Third Party Advisory | |
security@apache.org | https://access.redhat.com/errata/RHSA-2017:2483 | Third Party Advisory | |
security@apache.org | https://access.redhat.com/errata/RHSA-2017:3193 | Third Party Advisory | |
security@apache.org | https://access.redhat.com/errata/RHSA-2017:3194 | Third Party Advisory | |
security@apache.org | https://lists.apache.org/thread.html/55a068b6a5eec0b3198ae7d96a7cb412352d0ffa7716612c5af3745b%40%3Cdev.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E | ||
security@apache.org | https://security.gentoo.org/glsa/201710-32 | Third Party Advisory | |
security@apache.org | https://security.netapp.com/advisory/ntap-20180601-0002/ | Third Party Advisory | |
security@apache.org | https://support.apple.com/HT208221 | Third Party Advisory | |
security@apache.org | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us | Third Party Advisory | |
security@apache.org | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us | Third Party Advisory | |
security@apache.org | https://www.tenable.com/security/tns-2019-09 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2017/dsa-3896 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/99137 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038711 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:2479 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:2483 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:3193 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:3194 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/55a068b6a5eec0b3198ae7d96a7cb412352d0ffa7716612c5af3745b%40%3Cdev.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201710-32 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20180601-0002/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/HT208221 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/tns-2019-09 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | http_server | 2.2.32 | |
apache | http_server | 2.4.24 | |
apache | http_server | 2.4.25 | |
netapp | clustered_data_ontap | - | |
netapp | oncommand_unified_manager | - | |
netapp | storagegrid | - | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_eus | 7.2 | |
redhat | enterprise_linux_eus | 7.3 | |
redhat | enterprise_linux_eus | 7.4 | |
redhat | enterprise_linux_eus | 7.5 | |
redhat | enterprise_linux_eus | 7.6 | |
redhat | enterprise_linux_eus | 7.7 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_server_aus | 7.2 | |
redhat | enterprise_linux_server_aus | 7.3 | |
redhat | enterprise_linux_server_aus | 7.4 | |
redhat | enterprise_linux_server_aus | 7.6 | |
redhat | enterprise_linux_server_aus | 7.7 | |
redhat | enterprise_linux_server_tus | 7.2 | |
redhat | enterprise_linux_server_tus | 7.3 | |
redhat | enterprise_linux_server_tus | 7.4 | |
redhat | enterprise_linux_server_tus | 7.6 | |
redhat | enterprise_linux_server_tus | 7.7 | |
redhat | enterprise_linux_workstation | 7.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
oracle | secure_global_desktop | 5.3 | |
apple | mac_os_x | * | |
apple | mac_os_x | * | |
apple | mac_os_x | * | |
apple | mac_os_x | 10.11.6 | |
apple | mac_os_x | 10.11.6 | |
apple | mac_os_x | 10.11.6 | |
apple | mac_os_x | 10.11.6 | |
apple | mac_os_x | 10.11.6 | |
apple | mac_os_x | 10.11.6 | |
apple | mac_os_x | 10.11.6 | |
apple | mac_os_x | 10.12.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:http_server:2.2.32:*:*:*:*:*:*:*", "matchCriteriaId": "020254C9-BA4E-4705-A967-ABD498722C99", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "AD2AC773-59A1-46EB-8943-309ADF012435", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.25:*:*:*:*:*:*:*", "matchCriteriaId": "FB5673AB-53BB-40B2-83A7-8B82B2D0EBB8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FE996B1-6951-4F85-AA58-B99A379D2163", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*", "matchCriteriaId": "3FA5E22C-489B-4C5F-A5F3-C03F45CA8811", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*", "matchCriteriaId": "8ADFF451-740F-4DBA-BD23-3881945D3E40", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "AE1D81A1-CD24-4B17-8AFD-DC95E90AD7D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "807C024A-F8E8-4B48-A349-4C68CD252CA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "F96E3779-F56A-45FF-BB3D-4980527D721E", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "83737173-E12E-4641-BC49-0BD84A6B29D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C8D871B-AEA1-4407-AEE3-47EC782250FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6755B6AD-0422-467B-8115-34A60B1D1A40", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D5F7E11E-FB34-4467-8919-2B6BEAABF665", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:secure_global_desktop:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "8B4B4E96-1F12-4719-BDB7-4ED5D3DCF9ED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "C43CA59D-847F-4225-A7A6-02DEB1BB4F64", "versionEndExcluding": "10.13.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "591A337B-D469-4080-BEC6-5ED9523EFC92", "versionEndExcluding": "10.11.6", "versionStartIncluding": "10.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "97AA7714-48CD-4249-9968-81C9781B1102", "versionEndExcluding": "10.12.6", "versionStartIncluding": "10.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.11.6:-:*:*:*:*:*:*", "matchCriteriaId": "4B7FC88F-6216-480F-A27D-9A2D2D8F3034", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.11.6:security_update_2016-001:*:*:*:*:*:*", "matchCriteriaId": "C47360D3-4390-4F31-BA82-7A4F38408E68", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.11.6:security_update_2016-002:*:*:*:*:*:*", "matchCriteriaId": "DEB1158A-9D65-463A-A8AF-D946E95EB2D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.11.6:security_update_2016-003:*:*:*:*:*:*", "matchCriteriaId": "28B4E7A2-3022-4B23-A068-FFE58C3A449B", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.11.6:security_update_2017-001:*:*:*:*:*:*", "matchCriteriaId": "7EE0F7C4-53B7-4554-8F4D-AAB417A1569F", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.11.6:security_update_2017-002:*:*:*:*:*:*", "matchCriteriaId": "C03A4DED-974B-4FCE-92F7-83DA939E0847", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.11.6:security_update_2017-003:*:*:*:*:*:*", "matchCriteriaId": "47EF9186-8EBD-441B-B2DD-FB18C072EEBC", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.12.6:-:*:*:*:*:*:*", "matchCriteriaId": "6536473A-2ECF-4806-AC02-2386552BEAB1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value." }, { "lang": "es", "value": "Los cambios en el an\u00e1lisis sint\u00e1ctico estricto de HTTP a\u00f1adidos en las versiones 2.2.32 y 2.4.24 de Apache httpd introdujeron un error en el an\u00e1lisis de listas de tokens. Esto permite que ap_find_token() busque m\u00e1s all\u00e1 del final de la cadena de entrada. Un atacante puede conseguir causar un fallo de segmentaci\u00f3n o forzar a que ap_find_token() devuelva un valor incorrecto mediante la manipulaci\u00f3n de una secuencia de cabeceras de peticiones con fines maliciosos." } ], "id": "CVE-2017-7668", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-20T01:29:00.390", "references": [ { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3896" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99137" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038711" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2479" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2483" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:3193" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:3194" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/55a068b6a5eec0b3198ae7d96a7cb412352d0ffa7716612c5af3745b%40%3Cdev.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201710-32" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180601-0002/" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT208221" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03821en_us" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2019-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3896" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038711" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2483" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:3193" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:3194" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/55a068b6a5eec0b3198ae7d96a7cb412352d0ffa7716612c5af3745b%40%3Cdev.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201710-32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180601-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT208221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03821en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2019-09" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-126" } ], "source": "security@apache.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-mcc7-rcr3-2rgr
Vulnerability from github
Published
2022-04-30 00:02
Modified
2025-04-20 03:39
Severity ?
VLAI Severity ?
Details
The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.
{ "affected": [], "aliases": [ "CVE-2017-7668" ], "database_specific": { "cwe_ids": [ "CWE-125", "CWE-126" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-06-20T01:29:00Z", "severity": "HIGH" }, "details": "The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.", "id": "GHSA-mcc7-rcr3-2rgr", "modified": "2025-04-20T03:39:23Z", "published": "2022-04-30T00:02:19Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:2479" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201710-32" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20180601-0002" }, { "type": "WEB", "url": "https://support.apple.com/HT208221" }, { "type": "WEB", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03821en_us" }, { "type": "WEB", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us" }, { "type": "WEB", "url": "https://www.tenable.com/security/tns-2019-09" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:2483" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:3193" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:3194" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/55a068b6a5eec0b3198ae7d96a7cb412352d0ffa7716612c5af3745b%40%3Cdev.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/55a068b6a5eec0b3198ae7d96a7cb412352d0ffa7716612c5af3745b@%3Cdev.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "http://www.debian.org/security/2017/dsa-3896" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/99137" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1038711" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
suse-su-2017:2907-1
Vulnerability from csaf_suse
Published
2017-10-30 14:55
Modified
2017-10-30 14:55
Summary
Security update for apache2
Notes
Title of the patch
Security update for apache2
Description of the patch
This update for apache2 fixes the following issues:
- Allow disabling SNI on proxy connections using 'SetEnv proxy-disable-sni 1' in the configuration files. (bsc#1052830)
- Allow ECDH again in mod_ssl, it had been incorrectly disabled with the 2.2.34 update. (bsc#1064561)
Following security issue has been fixed:
- CVE-2017-9798: A use-after-free in the OPTIONS command could be used by attackers to disclose memory of the apache server process, when htaccess uses incorrect Limit statement. (bsc#1058058)
Additionally, references to the following security issues, fixed by the previous version-update of apache2
to Apache HTTPD 2.2.34 have been added:
- CVE-2017-7668: The HTTP strict parsing introduced a bug in token list parsing, which allowed ap_find_token() to
search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may
have be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value. (bsc#1045061)
- CVE-2017-3169: mod_ssl may have de-referenced a NULL pointer when third-party modules call
ap_hook_process_connection() during an HTTP request to an HTTPS port allowing for DoS. (bsc#1045062)
- CVE-2017-3167: Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may have
lead to authentication requirements being bypassed. (bsc#1045065)
- CVE-2017-7679: mod_mime could have read one byte past the end of a buffer when sending a malicious Content-Type
response header. (bsc#1045060)
Patchnames
sdksp4-apache2-13331,sleposp3-apache2-13331,slessp3-apache2-13331,slessp4-apache2-13331,slestso13-apache2-13331
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for apache2", "title": "Title of the patch" }, { "category": "description", "text": "This update for apache2 fixes the following issues:\n\n- Allow disabling SNI on proxy connections using \u0027SetEnv proxy-disable-sni 1\u0027 in the configuration files. (bsc#1052830)\n- Allow ECDH again in mod_ssl, it had been incorrectly disabled with the 2.2.34 update. (bsc#1064561)\n\nFollowing security issue has been fixed:\n\n- CVE-2017-9798: A use-after-free in the OPTIONS command could be used by attackers to disclose memory of the apache server process, when htaccess uses incorrect Limit statement. (bsc#1058058)\n\nAdditionally, references to the following security issues, fixed by the previous version-update of apache2\nto Apache HTTPD 2.2.34 have been added:\n\n- CVE-2017-7668: The HTTP strict parsing introduced a bug in token list parsing, which allowed ap_find_token() to\n search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may\n have be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value. (bsc#1045061)\n- CVE-2017-3169: mod_ssl may have de-referenced a NULL pointer when third-party modules call \n ap_hook_process_connection() during an HTTP request to an HTTPS port allowing for DoS. (bsc#1045062)\n- CVE-2017-3167: Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may have\n lead to authentication requirements being bypassed. (bsc#1045065)\n- CVE-2017-7679: mod_mime could have read one byte past the end of a buffer when sending a malicious Content-Type\n response header. (bsc#1045060)\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-apache2-13331,sleposp3-apache2-13331,slessp3-apache2-13331,slessp4-apache2-13331,slestso13-apache2-13331", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2907-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2907-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172907-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2907-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003365.html" }, { "category": "self", "summary": "SUSE Bug 1045060", "url": "https://bugzilla.suse.com/1045060" }, { "category": "self", "summary": "SUSE Bug 1045061", "url": "https://bugzilla.suse.com/1045061" }, { "category": "self", "summary": "SUSE Bug 1045062", "url": "https://bugzilla.suse.com/1045062" }, { "category": "self", "summary": "SUSE Bug 1045065", "url": "https://bugzilla.suse.com/1045065" }, { "category": "self", "summary": "SUSE Bug 1052830", "url": "https://bugzilla.suse.com/1052830" }, { "category": "self", "summary": "SUSE Bug 1058058", "url": "https://bugzilla.suse.com/1058058" }, { "category": "self", "summary": "SUSE Bug 1064561", "url": "https://bugzilla.suse.com/1064561" }, { "category": "self", "summary": "SUSE CVE CVE-2009-2699 page", "url": "https://www.suse.com/security/cve/CVE-2009-2699/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-0425 page", "url": "https://www.suse.com/security/cve/CVE-2010-0425/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-0021 page", "url": "https://www.suse.com/security/cve/CVE-2012-0021/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0118 page", "url": "https://www.suse.com/security/cve/CVE-2014-0118/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3167 page", "url": "https://www.suse.com/security/cve/CVE-2017-3167/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3169 page", "url": "https://www.suse.com/security/cve/CVE-2017-3169/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7668 page", "url": "https://www.suse.com/security/cve/CVE-2017-7668/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7679 page", "url": "https://www.suse.com/security/cve/CVE-2017-7679/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9798 page", "url": "https://www.suse.com/security/cve/CVE-2017-9798/" } ], "title": "Security update for apache2", "tracking": { "current_release_date": "2017-10-30T14:55:59Z", "generator": { "date": "2017-10-30T14:55:59Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2907-1", "initial_release_date": "2017-10-30T14:55:59Z", "revision_history": [ { "date": "2017-10-30T14:55:59Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "apache2-2.2.34-70.12.1.i586", "product": { "name": "apache2-2.2.34-70.12.1.i586", "product_id": "apache2-2.2.34-70.12.1.i586" } }, { "category": "product_version", "name": "apache2-devel-2.2.34-70.12.1.i586", "product": { "name": "apache2-devel-2.2.34-70.12.1.i586", "product_id": "apache2-devel-2.2.34-70.12.1.i586" } }, { "category": "product_version", "name": "apache2-doc-2.2.34-70.12.1.i586", "product": { "name": "apache2-doc-2.2.34-70.12.1.i586", "product_id": "apache2-doc-2.2.34-70.12.1.i586" } }, { "category": "product_version", "name": "apache2-example-pages-2.2.34-70.12.1.i586", "product": { "name": "apache2-example-pages-2.2.34-70.12.1.i586", "product_id": "apache2-example-pages-2.2.34-70.12.1.i586" } }, { "category": "product_version", "name": "apache2-prefork-2.2.34-70.12.1.i586", "product": { "name": "apache2-prefork-2.2.34-70.12.1.i586", "product_id": "apache2-prefork-2.2.34-70.12.1.i586" } }, { "category": "product_version", "name": "apache2-utils-2.2.34-70.12.1.i586", "product": { "name": "apache2-utils-2.2.34-70.12.1.i586", "product_id": "apache2-utils-2.2.34-70.12.1.i586" } }, { "category": "product_version", "name": "apache2-worker-2.2.34-70.12.1.i586", "product": { "name": "apache2-worker-2.2.34-70.12.1.i586", "product_id": "apache2-worker-2.2.34-70.12.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "apache2-devel-2.2.34-70.12.1.ia64", "product": { "name": "apache2-devel-2.2.34-70.12.1.ia64", "product_id": "apache2-devel-2.2.34-70.12.1.ia64" } }, { "category": "product_version", "name": "apache2-2.2.34-70.12.1.ia64", "product": { "name": "apache2-2.2.34-70.12.1.ia64", "product_id": "apache2-2.2.34-70.12.1.ia64" } }, { "category": "product_version", "name": "apache2-doc-2.2.34-70.12.1.ia64", "product": { "name": "apache2-doc-2.2.34-70.12.1.ia64", "product_id": "apache2-doc-2.2.34-70.12.1.ia64" } }, { "category": "product_version", "name": "apache2-example-pages-2.2.34-70.12.1.ia64", "product": { "name": "apache2-example-pages-2.2.34-70.12.1.ia64", "product_id": "apache2-example-pages-2.2.34-70.12.1.ia64" } }, { "category": "product_version", "name": "apache2-prefork-2.2.34-70.12.1.ia64", "product": { "name": "apache2-prefork-2.2.34-70.12.1.ia64", "product_id": "apache2-prefork-2.2.34-70.12.1.ia64" } }, { "category": "product_version", "name": "apache2-utils-2.2.34-70.12.1.ia64", "product": { "name": "apache2-utils-2.2.34-70.12.1.ia64", "product_id": "apache2-utils-2.2.34-70.12.1.ia64" } }, { "category": "product_version", "name": "apache2-worker-2.2.34-70.12.1.ia64", "product": { "name": "apache2-worker-2.2.34-70.12.1.ia64", "product_id": "apache2-worker-2.2.34-70.12.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "apache2-devel-2.2.34-70.12.1.ppc64", "product": { "name": "apache2-devel-2.2.34-70.12.1.ppc64", "product_id": "apache2-devel-2.2.34-70.12.1.ppc64" } }, { "category": "product_version", "name": "apache2-2.2.34-70.12.1.ppc64", "product": { "name": "apache2-2.2.34-70.12.1.ppc64", "product_id": "apache2-2.2.34-70.12.1.ppc64" } }, { "category": "product_version", "name": "apache2-doc-2.2.34-70.12.1.ppc64", "product": { "name": "apache2-doc-2.2.34-70.12.1.ppc64", "product_id": "apache2-doc-2.2.34-70.12.1.ppc64" } }, { "category": "product_version", "name": "apache2-example-pages-2.2.34-70.12.1.ppc64", "product": { "name": "apache2-example-pages-2.2.34-70.12.1.ppc64", "product_id": "apache2-example-pages-2.2.34-70.12.1.ppc64" } }, { "category": "product_version", "name": "apache2-prefork-2.2.34-70.12.1.ppc64", "product": { "name": "apache2-prefork-2.2.34-70.12.1.ppc64", "product_id": "apache2-prefork-2.2.34-70.12.1.ppc64" } }, { "category": "product_version", "name": "apache2-utils-2.2.34-70.12.1.ppc64", "product": { "name": "apache2-utils-2.2.34-70.12.1.ppc64", "product_id": "apache2-utils-2.2.34-70.12.1.ppc64" } }, { "category": "product_version", "name": "apache2-worker-2.2.34-70.12.1.ppc64", "product": { "name": "apache2-worker-2.2.34-70.12.1.ppc64", "product_id": "apache2-worker-2.2.34-70.12.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "apache2-devel-2.2.34-70.12.1.s390x", "product": { "name": "apache2-devel-2.2.34-70.12.1.s390x", "product_id": "apache2-devel-2.2.34-70.12.1.s390x" } }, { "category": "product_version", "name": "apache2-2.2.34-70.12.1.s390x", "product": { "name": "apache2-2.2.34-70.12.1.s390x", "product_id": "apache2-2.2.34-70.12.1.s390x" } }, { "category": "product_version", "name": "apache2-doc-2.2.34-70.12.1.s390x", "product": { "name": "apache2-doc-2.2.34-70.12.1.s390x", "product_id": "apache2-doc-2.2.34-70.12.1.s390x" } }, { "category": "product_version", "name": "apache2-example-pages-2.2.34-70.12.1.s390x", "product": { "name": "apache2-example-pages-2.2.34-70.12.1.s390x", "product_id": "apache2-example-pages-2.2.34-70.12.1.s390x" } }, { "category": "product_version", "name": "apache2-prefork-2.2.34-70.12.1.s390x", "product": { "name": "apache2-prefork-2.2.34-70.12.1.s390x", "product_id": "apache2-prefork-2.2.34-70.12.1.s390x" } }, { "category": "product_version", "name": "apache2-utils-2.2.34-70.12.1.s390x", "product": { "name": "apache2-utils-2.2.34-70.12.1.s390x", "product_id": "apache2-utils-2.2.34-70.12.1.s390x" } }, { "category": "product_version", "name": "apache2-worker-2.2.34-70.12.1.s390x", "product": { "name": "apache2-worker-2.2.34-70.12.1.s390x", "product_id": "apache2-worker-2.2.34-70.12.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "apache2-2.2.34-70.12.1.x86_64", "product": { "name": "apache2-2.2.34-70.12.1.x86_64", "product_id": "apache2-2.2.34-70.12.1.x86_64" } }, { "category": "product_version", "name": "apache2-devel-2.2.34-70.12.1.x86_64", "product": { "name": "apache2-devel-2.2.34-70.12.1.x86_64", "product_id": "apache2-devel-2.2.34-70.12.1.x86_64" } }, { "category": "product_version", "name": "apache2-doc-2.2.34-70.12.1.x86_64", "product": { "name": "apache2-doc-2.2.34-70.12.1.x86_64", "product_id": "apache2-doc-2.2.34-70.12.1.x86_64" } }, { "category": "product_version", "name": "apache2-example-pages-2.2.34-70.12.1.x86_64", "product": { "name": "apache2-example-pages-2.2.34-70.12.1.x86_64", "product_id": "apache2-example-pages-2.2.34-70.12.1.x86_64" } }, { "category": "product_version", "name": "apache2-prefork-2.2.34-70.12.1.x86_64", "product": { "name": "apache2-prefork-2.2.34-70.12.1.x86_64", "product_id": "apache2-prefork-2.2.34-70.12.1.x86_64" } }, { "category": "product_version", "name": "apache2-utils-2.2.34-70.12.1.x86_64", "product": { "name": "apache2-utils-2.2.34-70.12.1.x86_64", "product_id": "apache2-utils-2.2.34-70.12.1.x86_64" } }, { "category": "product_version", "name": "apache2-worker-2.2.34-70.12.1.x86_64", "product": { "name": "apache2-worker-2.2.34-70.12.1.x86_64", "product_id": "apache2-worker-2.2.34-70.12.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } }, { "category": "product_name", "name": "SUSE Studio Onsite 1.3", "product": { "name": "SUSE Studio Onsite 1.3", "product_id": "SUSE Studio Onsite 1.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-studioonsite:1.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apache2-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586" }, "product_reference": "apache2-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586" }, "product_reference": "apache2-devel-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.2.34-70.12.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64" }, "product_reference": "apache2-devel-2.2.34-70.12.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.2.34-70.12.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64" }, "product_reference": "apache2-devel-2.2.34-70.12.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-devel-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-devel-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586" }, "product_reference": "apache2-doc-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-doc-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586" }, "product_reference": "apache2-example-pages-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-example-pages-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586" }, "product_reference": "apache2-prefork-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-prefork-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586" }, "product_reference": "apache2-utils-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-utils-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586" }, "product_reference": "apache2-worker-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-worker-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586" }, "product_reference": "apache2-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586" }, "product_reference": "apache2-devel-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586" }, "product_reference": "apache2-doc-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586" }, "product_reference": "apache2-example-pages-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586" }, "product_reference": "apache2-prefork-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586" }, "product_reference": "apache2-utils-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586" }, "product_reference": "apache2-worker-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586" }, "product_reference": "apache2-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586" }, "product_reference": "apache2-devel-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-devel-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-devel-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586" }, "product_reference": "apache2-doc-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-doc-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-doc-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586" }, "product_reference": "apache2-example-pages-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-example-pages-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-example-pages-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586" }, "product_reference": "apache2-prefork-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-prefork-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-prefork-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586" }, "product_reference": "apache2-utils-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-utils-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-utils-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586" }, "product_reference": "apache2-worker-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-worker-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-worker-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586" }, "product_reference": "apache2-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586" }, "product_reference": "apache2-devel-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-devel-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-devel-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586" }, "product_reference": "apache2-doc-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-doc-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-doc-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586" }, "product_reference": "apache2-example-pages-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-example-pages-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-example-pages-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586" }, "product_reference": "apache2-prefork-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-prefork-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-prefork-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586" }, "product_reference": "apache2-utils-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-utils-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-utils-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586" }, "product_reference": "apache2-worker-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-worker-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-worker-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586" }, "product_reference": "apache2-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.2.34-70.12.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64" }, "product_reference": "apache2-2.2.34-70.12.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.2.34-70.12.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64" }, "product_reference": "apache2-2.2.34-70.12.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586" }, "product_reference": "apache2-doc-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.2.34-70.12.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64" }, "product_reference": "apache2-doc-2.2.34-70.12.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.2.34-70.12.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64" }, "product_reference": "apache2-doc-2.2.34-70.12.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-doc-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-doc-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586" }, "product_reference": "apache2-example-pages-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.2.34-70.12.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64" }, "product_reference": "apache2-example-pages-2.2.34-70.12.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.2.34-70.12.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64" }, "product_reference": "apache2-example-pages-2.2.34-70.12.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-example-pages-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-example-pages-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586" }, "product_reference": "apache2-prefork-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.2.34-70.12.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64" }, "product_reference": "apache2-prefork-2.2.34-70.12.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.2.34-70.12.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64" }, "product_reference": "apache2-prefork-2.2.34-70.12.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-prefork-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-prefork-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586" }, "product_reference": "apache2-utils-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.2.34-70.12.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64" }, "product_reference": "apache2-utils-2.2.34-70.12.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.2.34-70.12.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64" }, "product_reference": "apache2-utils-2.2.34-70.12.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-utils-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-utils-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586" }, "product_reference": "apache2-worker-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.2.34-70.12.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64" }, "product_reference": "apache2-worker-2.2.34-70.12.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.2.34-70.12.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64" }, "product_reference": "apache2-worker-2.2.34-70.12.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-worker-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-worker-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586" }, "product_reference": "apache2-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.2.34-70.12.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64" }, "product_reference": "apache2-2.2.34-70.12.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.2.34-70.12.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64" }, "product_reference": "apache2-2.2.34-70.12.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586" }, "product_reference": "apache2-doc-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.2.34-70.12.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64" }, "product_reference": "apache2-doc-2.2.34-70.12.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.2.34-70.12.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64" }, "product_reference": "apache2-doc-2.2.34-70.12.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-doc-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-doc-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586" }, "product_reference": "apache2-example-pages-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.2.34-70.12.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64" }, "product_reference": "apache2-example-pages-2.2.34-70.12.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.2.34-70.12.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64" }, "product_reference": "apache2-example-pages-2.2.34-70.12.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-example-pages-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-example-pages-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586" }, "product_reference": "apache2-prefork-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.2.34-70.12.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64" }, "product_reference": "apache2-prefork-2.2.34-70.12.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.2.34-70.12.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64" }, "product_reference": "apache2-prefork-2.2.34-70.12.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-prefork-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-prefork-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586" }, "product_reference": "apache2-utils-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.2.34-70.12.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64" }, "product_reference": "apache2-utils-2.2.34-70.12.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.2.34-70.12.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64" }, "product_reference": "apache2-utils-2.2.34-70.12.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-utils-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-utils-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.2.34-70.12.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586" }, "product_reference": "apache2-worker-2.2.34-70.12.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.2.34-70.12.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64" }, "product_reference": "apache2-worker-2.2.34-70.12.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.2.34-70.12.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64" }, "product_reference": "apache2-worker-2.2.34-70.12.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.2.34-70.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x" }, "product_reference": "apache2-worker-2.2.34-70.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.2.34-70.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-worker-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.2.34-70.12.1.x86_64 as component of SUSE Studio Onsite 1.3", "product_id": "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" }, "product_reference": "apache2-devel-2.2.34-70.12.1.x86_64", "relates_to_product_reference": "SUSE Studio Onsite 1.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-2699", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-2699" } ], "notes": [ { "category": "general", "text": "The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library before 1.3.9, as used in the Apache HTTP Server before 2.2.14 and other products, does not properly handle errors, which allows remote attackers to cause a denial of service (daemon hang) via unspecified HTTP requests, related to the prefork and event MPMs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-2699", "url": "https://www.suse.com/security/cve/CVE-2009-2699" }, { "category": "external", "summary": "SUSE Bug 1078450 for CVE-2009-2699", "url": "https://bugzilla.suse.com/1078450" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-30T14:55:59Z", "details": "important" } ], "title": "CVE-2009-2699" }, { "cve": "CVE-2010-0425", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-0425" } ], "notes": [ { "category": "general", "text": "modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and \"orphaned callback pointers.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-0425", "url": "https://www.suse.com/security/cve/CVE-2010-0425" }, { "category": "external", "summary": "SUSE Bug 1078450 for CVE-2010-0425", "url": "https://bugzilla.suse.com/1078450" }, { "category": "external", "summary": "SUSE Bug 586572 for CVE-2010-0425", "url": "https://bugzilla.suse.com/586572" }, { "category": "external", "summary": "SUSE Bug 601151 for CVE-2010-0425", "url": "https://bugzilla.suse.com/601151" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-30T14:55:59Z", "details": "critical" } ], "title": "CVE-2010-0425" }, { "cve": "CVE-2012-0021", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-0021" } ], "notes": [ { "category": "general", "text": "The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-0021", "url": "https://www.suse.com/security/cve/CVE-2012-0021" }, { "category": "external", "summary": "SUSE Bug 1078450 for CVE-2012-0021", "url": "https://bugzilla.suse.com/1078450" }, { "category": "external", "summary": "SUSE Bug 743744 for CVE-2012-0021", "url": "https://bugzilla.suse.com/743744" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-30T14:55:59Z", "details": "moderate" } ], "title": "CVE-2012-0021" }, { "cve": "CVE-2014-0118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0118" } ], "notes": [ { "category": "general", "text": "The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0118", "url": "https://www.suse.com/security/cve/CVE-2014-0118" }, { "category": "external", "summary": "SUSE Bug 1078450 for CVE-2014-0118", "url": "https://bugzilla.suse.com/1078450" }, { "category": "external", "summary": "SUSE Bug 887769 for CVE-2014-0118", "url": "https://bugzilla.suse.com/887769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-30T14:55:59Z", "details": "moderate" } ], "title": "CVE-2014-0118" }, { "cve": "CVE-2017-3167", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3167" } ], "notes": [ { "category": "general", "text": "In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3167", "url": "https://www.suse.com/security/cve/CVE-2017-3167" }, { "category": "external", "summary": "SUSE Bug 1045065 for CVE-2017-3167", "url": "https://bugzilla.suse.com/1045065" }, { "category": "external", "summary": "SUSE Bug 1078450 for CVE-2017-3167", "url": "https://bugzilla.suse.com/1078450" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-30T14:55:59Z", "details": "important" } ], "title": "CVE-2017-3167" }, { "cve": "CVE-2017-3169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3169" } ], "notes": [ { "category": "general", "text": "In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3169", "url": "https://www.suse.com/security/cve/CVE-2017-3169" }, { "category": "external", "summary": "SUSE Bug 1045062 for CVE-2017-3169", "url": "https://bugzilla.suse.com/1045062" }, { "category": "external", "summary": "SUSE Bug 1078450 for CVE-2017-3169", "url": "https://bugzilla.suse.com/1078450" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-30T14:55:59Z", "details": "moderate" } ], "title": "CVE-2017-3169" }, { "cve": "CVE-2017-7668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7668" } ], "notes": [ { "category": "general", "text": "The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7668", "url": "https://www.suse.com/security/cve/CVE-2017-7668" }, { "category": "external", "summary": "SUSE Bug 1045061 for CVE-2017-7668", "url": "https://bugzilla.suse.com/1045061" }, { "category": "external", "summary": "SUSE Bug 1078450 for CVE-2017-7668", "url": "https://bugzilla.suse.com/1078450" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-30T14:55:59Z", "details": "critical" } ], "title": "CVE-2017-7668" }, { "cve": "CVE-2017-7679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7679" } ], "notes": [ { "category": "general", "text": "In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7679", "url": "https://www.suse.com/security/cve/CVE-2017-7679" }, { "category": "external", "summary": "SUSE Bug 1045060 for CVE-2017-7679", "url": "https://bugzilla.suse.com/1045060" }, { "category": "external", "summary": "SUSE Bug 1057861 for CVE-2017-7679", "url": "https://bugzilla.suse.com/1057861" }, { "category": "external", "summary": "SUSE Bug 1078450 for CVE-2017-7679", "url": "https://bugzilla.suse.com/1078450" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-30T14:55:59Z", "details": "moderate" } ], "title": "CVE-2017-7679" }, { "cve": "CVE-2017-9798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9798" } ], "notes": [ { "category": "general", "text": "Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user\u0027s .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9798", "url": "https://www.suse.com/security/cve/CVE-2017-9798" }, { "category": "external", "summary": "SUSE Bug 1058058 for CVE-2017-9798", "url": "https://bugzilla.suse.com/1058058" }, { "category": "external", "summary": "SUSE Bug 1060757 for CVE-2017-9798", "url": "https://bugzilla.suse.com/1060757" }, { "category": "external", "summary": "SUSE Bug 1077582 for CVE-2017-9798", "url": "https://bugzilla.suse.com/1077582" }, { "category": "external", "summary": "SUSE Bug 1078450 for CVE-2017-9798", "url": "https://bugzilla.suse.com/1078450" }, { "category": "external", "summary": "SUSE Bug 1089997 for CVE-2017-9798", "url": "https://bugzilla.suse.com/1089997" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.12.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.12.1.x86_64", "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-30T14:55:59Z", "details": "moderate" } ], "title": "CVE-2017-9798" } ] }
wid-sec-w-2025-0370
Vulnerability from csaf_certbund
Published
2017-09-25 22:00
Modified
2025-02-13 23:00
Summary
Apple Mac OS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Apple Mac OS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstelle in Apple Mac OS ausnutzen, um Code mit Kernel Privilegien auszuführen, Sicherheitsvorkehrungen zu umgehen, einen Denial of Service Angriff durchzuführen oder vertrauliche Daten einzusehen.
Betroffene Betriebssysteme
- MacOS X
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apple Mac OS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstelle in Apple Mac OS ausnutzen, um Code mit Kernel Privilegien auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Denial of Service Angriff durchzuf\u00fchren oder vertrauliche Daten einzusehen.", "title": "Angriff" }, { "category": "general", "text": "- MacOS X", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0370 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2017/wid-sec-w-2025-0370.json" }, { "category": "self", "summary": "WID-SEC-2025-0370 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0370" }, { "category": "external", "summary": "Apple Security Advisory HT208144 vom 2017-09-25", "url": "https://support.apple.com/de-de/HT208144" }, { "category": "external", "summary": "Updated Apple Security Advisory HT208144 vom 2017-10-31", "url": "https://lists.apple.com/archives/security-announce/2017/Oct/msg00007.html" }, { "category": "external", "summary": "Updated Apple Security Advisory HT208144 vom 2017-10-31", "url": "https://lists.apple.com/archives/security-announce/2017/Oct/msg00001.html" } ], "source_lang": "en-US", "title": "Apple Mac OS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-02-13T23:00:00.000+00:00", "generator": { "date": "2025-02-14T12:00:12.636+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2025-0370", "initial_release_date": "2017-09-25T22:00:00.000+00:00", "revision_history": [ { "date": "2017-09-25T22:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2017-10-31T23:00:00.000+00:00", "number": "2", "summary": "cve added" }, { "date": "2017-10-31T23:00:00.000+00:00", "number": "3", "summary": "Version nicht vorhanden" }, { "date": "2017-10-31T23:00:00.000+00:00", "number": "4", "summary": "Version nicht vorhanden" }, { "date": "2017-11-21T23:00:00.000+00:00", "number": "5", "summary": "cve added" }, { "date": "2017-11-21T23:00:00.000+00:00", "number": "6", "summary": "Version nicht vorhanden" }, { "date": "2017-12-13T23:00:00.000+00:00", "number": "7", "summary": "New remediations available" }, { "date": "2025-02-13T23:00:00.000+00:00", "number": "8", "summary": "Korrektur" } ], "status": "final", "version": "8" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c10.13", "product": { "name": "Apple macOS \u003c10.13", "product_id": "T010822" } }, { "category": "product_version", "name": "10.13", "product": { "name": "Apple macOS 10.13", "product_id": "T010822-fixed", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:10.13" } } } ], "category": "product_name", "name": "macOS" } ], "category": "vendor", "name": "Apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-0736", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-0736" }, { "cve": "CVE-2016-2161", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-2161" }, { "cve": "CVE-2016-4736", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-4736" }, { "cve": "CVE-2016-5387", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-5387" }, { "cve": "CVE-2016-8740", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-8740" }, { "cve": "CVE-2016-8743", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-8743" }, { "cve": "CVE-2016-9042", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-9042" }, { "cve": "CVE-2016-9063", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-9063" }, { "cve": "CVE-2016-9840", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-9840" }, { "cve": "CVE-2016-9841", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-9841" }, { "cve": "CVE-2016-9842", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-9842" }, { "cve": "CVE-2016-9843", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2016-9843" }, { "cve": "CVE-2017-0381", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-0381" }, { "cve": "CVE-2017-1000100", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-1000100" }, { "cve": "CVE-2017-1000101", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-1000101" }, { "cve": "CVE-2017-1000373", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-1000373" }, { "cve": "CVE-2017-10140", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-10140" }, { "cve": "CVE-2017-10989", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-10989" }, { "cve": "CVE-2017-11103", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-11103" }, { "cve": "CVE-2017-11108", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-11108" }, { "cve": "CVE-2017-11541", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-11541" }, { "cve": "CVE-2017-11542", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-11542" }, { "cve": "CVE-2017-11543", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-11543" }, { "cve": "CVE-2017-12893", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12893" }, { "cve": "CVE-2017-12894", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12894" }, { "cve": "CVE-2017-12895", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12895" }, { "cve": "CVE-2017-12896", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12896" }, { "cve": "CVE-2017-12897", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12897" }, { "cve": "CVE-2017-12898", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12898" }, { "cve": "CVE-2017-12899", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12899" }, { "cve": "CVE-2017-12900", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12900" }, { "cve": "CVE-2017-12901", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12901" }, { "cve": "CVE-2017-12902", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12902" }, { "cve": "CVE-2017-12985", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12985" }, { "cve": "CVE-2017-12986", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12986" }, { "cve": "CVE-2017-12987", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12987" }, { "cve": "CVE-2017-12988", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12988" }, { "cve": "CVE-2017-12989", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12989" }, { "cve": "CVE-2017-12990", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12990" }, { "cve": "CVE-2017-12991", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12991" }, { "cve": "CVE-2017-12992", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12992" }, { "cve": "CVE-2017-12993", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12993" }, { "cve": "CVE-2017-12994", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12994" }, { "cve": "CVE-2017-12995", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12995" }, { "cve": "CVE-2017-12996", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12996" }, { "cve": "CVE-2017-12997", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12997" }, { "cve": "CVE-2017-12998", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12998" }, { "cve": "CVE-2017-12999", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-12999" }, { "cve": "CVE-2017-13000", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13000" }, { "cve": "CVE-2017-13001", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13001" }, { "cve": "CVE-2017-13002", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13002" }, { "cve": "CVE-2017-13003", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13003" }, { "cve": "CVE-2017-13004", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13004" }, { "cve": "CVE-2017-13005", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13005" }, { "cve": "CVE-2017-13006", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13006" }, { "cve": "CVE-2017-13007", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13007" }, { "cve": "CVE-2017-13008", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13008" }, { "cve": "CVE-2017-13009", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13009" }, { "cve": "CVE-2017-13010", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13010" }, { "cve": "CVE-2017-13011", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13011" }, { "cve": "CVE-2017-13012", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13012" }, { "cve": "CVE-2017-13013", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13013" }, { "cve": "CVE-2017-13014", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13014" }, { "cve": "CVE-2017-13015", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13015" }, { "cve": "CVE-2017-13016", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13016" }, { "cve": "CVE-2017-13017", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13017" }, { "cve": "CVE-2017-13018", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13018" }, { "cve": "CVE-2017-13019", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13019" }, { "cve": "CVE-2017-13020", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13020" }, { "cve": "CVE-2017-13021", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13021" }, { "cve": "CVE-2017-13022", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13022" }, { "cve": "CVE-2017-13023", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13023" }, { "cve": "CVE-2017-13024", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13024" }, { "cve": "CVE-2017-13025", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13025" }, { "cve": "CVE-2017-13026", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13026" }, { "cve": "CVE-2017-13027", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13027" }, { "cve": "CVE-2017-13028", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13028" }, { "cve": "CVE-2017-13029", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13029" }, { "cve": "CVE-2017-13030", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13030" }, { "cve": "CVE-2017-13031", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13031" }, { "cve": "CVE-2017-13032", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13032" }, { "cve": "CVE-2017-13033", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13033" }, { "cve": "CVE-2017-13034", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13034" }, { "cve": "CVE-2017-13035", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13035" }, { "cve": "CVE-2017-13036", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13036" }, { "cve": "CVE-2017-13037", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13037" }, { "cve": "CVE-2017-13038", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13038" }, { "cve": "CVE-2017-13039", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13039" }, { "cve": "CVE-2017-13040", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13040" }, { "cve": "CVE-2017-13041", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13041" }, { "cve": "CVE-2017-13042", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13042" }, { "cve": "CVE-2017-13043", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13043" }, { "cve": "CVE-2017-13044", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13044" }, { "cve": "CVE-2017-13045", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13045" }, { "cve": "CVE-2017-13046", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13046" }, { "cve": "CVE-2017-13047", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13047" }, { "cve": "CVE-2017-13048", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13048" }, { "cve": "CVE-2017-13049", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13049" }, { "cve": "CVE-2017-13050", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13050" }, { "cve": "CVE-2017-13051", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13051" }, { "cve": "CVE-2017-13052", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13052" }, { "cve": "CVE-2017-13053", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13053" }, { "cve": "CVE-2017-13054", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13054" }, { "cve": "CVE-2017-13055", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13055" }, { "cve": "CVE-2017-13077", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13077" }, { "cve": "CVE-2017-13078", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13078" }, { "cve": "CVE-2017-13080", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13080" }, { "cve": "CVE-2017-13687", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13687" }, { "cve": "CVE-2017-13688", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13688" }, { "cve": "CVE-2017-13689", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13689" }, { "cve": "CVE-2017-13690", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13690" }, { "cve": "CVE-2017-13725", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13725" }, { "cve": "CVE-2017-13782", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13782" }, { "cve": "CVE-2017-13786", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13786" }, { "cve": "CVE-2017-13799", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13799" }, { "cve": "CVE-2017-13800", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13800" }, { "cve": "CVE-2017-13801", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13801" }, { "cve": "CVE-2017-13804", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13804" }, { "cve": "CVE-2017-13807", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13807" }, { "cve": "CVE-2017-13808", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13808" }, { "cve": "CVE-2017-13809", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13809" }, { "cve": "CVE-2017-13810", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13810" }, { "cve": "CVE-2017-13811", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13811" }, { "cve": "CVE-2017-13812", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13812" }, { "cve": "CVE-2017-13813", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13813" }, { "cve": "CVE-2017-13814", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13814" }, { "cve": "CVE-2017-13815", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13815" }, { "cve": "CVE-2017-13816", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13816" }, { "cve": "CVE-2017-13817", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13817" }, { "cve": "CVE-2017-13818", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13818" }, { "cve": "CVE-2017-13819", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13819" }, { "cve": "CVE-2017-13820", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13820" }, { "cve": "CVE-2017-13821", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13821" }, { "cve": "CVE-2017-13822", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13822" }, { "cve": "CVE-2017-13823", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13823" }, { "cve": "CVE-2017-13824", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13824" }, { "cve": "CVE-2017-13825", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13825" }, { "cve": "CVE-2017-13826", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13826" }, { "cve": "CVE-2017-13827", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13827" }, { "cve": "CVE-2017-13828", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13828" }, { "cve": "CVE-2017-13829", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13829" }, { "cve": "CVE-2017-13830", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13830" }, { "cve": "CVE-2017-13831", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13831" }, { "cve": "CVE-2017-13832", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13832" }, { "cve": "CVE-2017-13833", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13833" }, { "cve": "CVE-2017-13834", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13834" }, { "cve": "CVE-2017-13836", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13836" }, { "cve": "CVE-2017-13837", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13837" }, { "cve": "CVE-2017-13838", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13838" }, { "cve": "CVE-2017-13839", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13839" }, { "cve": "CVE-2017-13840", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13840" }, { "cve": "CVE-2017-13841", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13841" }, { "cve": "CVE-2017-13842", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13842" }, { "cve": "CVE-2017-13843", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13843" }, { "cve": "CVE-2017-13846", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13846" }, { "cve": "CVE-2017-13851", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13851" }, { "cve": "CVE-2017-13854", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-13854" }, { "cve": "CVE-2017-3167", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-3167" }, { "cve": "CVE-2017-3169", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-3169" }, { "cve": "CVE-2017-6451", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-6451" }, { "cve": "CVE-2017-6452", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-6452" }, { "cve": "CVE-2017-6455", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-6455" }, { "cve": "CVE-2017-6458", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-6458" }, { "cve": "CVE-2017-6459", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-6459" }, { "cve": "CVE-2017-6460", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-6460" }, { "cve": "CVE-2017-6462", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-6462" }, { "cve": "CVE-2017-6463", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-6463" }, { "cve": "CVE-2017-6464", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-6464" }, { "cve": "CVE-2017-7074", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7074" }, { "cve": "CVE-2017-7077", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7077" }, { "cve": "CVE-2017-7078", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7078" }, { "cve": "CVE-2017-7080", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7080" }, { "cve": "CVE-2017-7082", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7082" }, { "cve": "CVE-2017-7083", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7083" }, { "cve": "CVE-2017-7084", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7084" }, { "cve": "CVE-2017-7086", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7086" }, { "cve": "CVE-2017-7114", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7114" }, { "cve": "CVE-2017-7119", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7119" }, { "cve": "CVE-2017-7121", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7121" }, { "cve": "CVE-2017-7122", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7122" }, { "cve": "CVE-2017-7123", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7123" }, { "cve": "CVE-2017-7124", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7124" }, { "cve": "CVE-2017-7125", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7125" }, { "cve": "CVE-2017-7126", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7126" }, { "cve": "CVE-2017-7127", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7127" }, { "cve": "CVE-2017-7128", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7128" }, { "cve": "CVE-2017-7129", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7129" }, { "cve": "CVE-2017-7130", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7130" }, { "cve": "CVE-2017-7132", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7132" }, { "cve": "CVE-2017-7138", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7138" }, { "cve": "CVE-2017-7141", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7141" }, { "cve": "CVE-2017-7143", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7143" }, { "cve": "CVE-2017-7144", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7144" }, { "cve": "CVE-2017-7659", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7659" }, { "cve": "CVE-2017-7668", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7668" }, { "cve": "CVE-2017-7679", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-7679" }, { "cve": "CVE-2017-9233", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-9233" }, { "cve": "CVE-2017-9788", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-9788" }, { "cve": "CVE-2017-9789", "product_status": { "known_affected": [ "T010822" ] }, "release_date": "2017-09-25T22:00:00.000+00:00", "title": "CVE-2017-9789" } ] }
gsd-2017-7668
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2017-7668", "description": "The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.", "id": "GSD-2017-7668", "references": [ "https://www.suse.com/security/cve/CVE-2017-7668.html", "https://www.debian.org/security/2017/dsa-3896", "https://access.redhat.com/errata/RHSA-2017:3194", "https://access.redhat.com/errata/RHSA-2017:3193", "https://access.redhat.com/errata/RHSA-2017:2483", "https://access.redhat.com/errata/RHSA-2017:2479", "https://ubuntu.com/security/CVE-2017-7668", "https://advisories.mageia.org/CVE-2017-7668.html", "https://security.archlinux.org/CVE-2017-7668", "https://alas.aws.amazon.com/cve/html/CVE-2017-7668.html", "https://linux.oracle.com/cve/CVE-2017-7668.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-7668" ], "details": "The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.", "id": "GSD-2017-7668", "modified": "2023-12-13T01:21:06.793316Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2017-7668", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache HTTP Server", "version": { "version_data": [ { "version_value": "2.2.32" }, { "version_value": "2.4.24, 2.4.25" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service, Integrity Violation (CWE-126)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/HT208221", "refsource": "CONFIRM", "url": "https://support.apple.com/HT208221" }, { "name": "RHSA-2017:2479", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2479" }, { "name": "[dev] 20170619 CVE-2017-7668: ap_find_token buffer overread", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/55a068b6a5eec0b3198ae7d96a7cb412352d0ffa7716612c5af3745b@%3Cdev.httpd.apache.org%3E" }, { "name": "RHSA-2017:2483", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2483" }, { "name": "https://security.netapp.com/advisory/ntap-20180601-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180601-0002/" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03821en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03821en_us" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "99137", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99137" }, { "name": "DSA-3896", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3896" }, { "name": "RHSA-2017:3194", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3194" }, { "name": "RHSA-2017:3193", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3193" }, { "name": "1038711", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038711" }, { "name": "GLSA-201710-32", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201710-32" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E" }, { "name": "https://www.tenable.com/security/tns-2019-09", "refsource": "CONFIRM", "url": "https://www.tenable.com/security/tns-2019-09" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:secure_global_desktop:5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.11.6", "versionStartIncluding": "10.11.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.11.6:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.11.6:security_update_2016-001:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.11.6:security_update_2016-002:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.11.6:security_update_2016-003:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.11.6:security_update_2017-001:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.11.6:security_update_2017-002:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.11.6:security_update_2017-003:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.12.6", "versionStartIncluding": "10.12.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.12.6:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.13.1", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2017-7668" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-125" } ] } ] }, "references": { "reference_data": [ { "name": "[dev] 20170619 CVE-2017-7668: ap_find_token buffer overread", "refsource": "MLIST", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/55a068b6a5eec0b3198ae7d96a7cb412352d0ffa7716612c5af3745b@%3Cdev.httpd.apache.org%3E" }, { "name": "99137", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99137" }, { "name": "1038711", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038711" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "GLSA-201710-32", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201710-32" }, { "name": "DSA-3896", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3896" }, { "name": "https://support.apple.com/HT208221", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT208221" }, { "name": "RHSA-2017:3194", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:3194" }, { "name": "RHSA-2017:3193", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:3193" }, { "name": "RHSA-2017:2483", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2483" }, { "name": "RHSA-2017:2479", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2479" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03821en_us", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03821en_us" }, { "name": "https://security.netapp.com/advisory/ntap-20180601-0002/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180601-0002/" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E" }, { "name": "https://www.tenable.com/security/tns-2019-09", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2019-09" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": true, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2022-04-21T14:40Z", "publishedDate": "2017-06-20T01:29Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…