{"id":"RHSA-2018:3558","summary":"Red Hat Security Advisory: httpd24 security, bug fix, and enhancement update","modified":"2026-02-21T10:02:21Z","published":"2024-09-13T16:54:33Z","upstream":["CVE-2016-5419","CVE-2016-5420","CVE-2016-5421","CVE-2016-7141","CVE-2016-7167","CVE-2016-8615","CVE-2016-8616","CVE-2016-8617","CVE-2016-8618","CVE-2016-8619","CVE-2016-8620","CVE-2016-8621","CVE-2016-8622","CVE-2016-8623","CVE-2016-8624","CVE-2016-8625","CVE-2016-9586","CVE-2017-1000100","CVE-2017-1000101","CVE-2017-1000254","CVE-2017-1000257","CVE-2017-15710","CVE-2017-15715","CVE-2017-7407","CVE-2017-8816","CVE-2017-8817","CVE-2018-1000007","CVE-2018-1000120","CVE-2018-1000121","CVE-2018-1000122","CVE-2018-1000301","CVE-2018-11763","CVE-2018-1283","CVE-2018-1301","CVE-2018-1303","CVE-2018-1312","CVE-2018-1333","CVE-2018-14618"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3558"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_software_collections/3/html/3.2_release_notes/chap-rhscl#sect-RHSCL-Changes-httpd"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1362183"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1362190"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1362199"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1373229"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375906"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388370"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388371"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388377"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388378"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388379"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388382"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388385"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388386"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388388"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388390"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388392"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1406712"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1439190"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1478309"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1478310"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1495541"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1503705"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1515757"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1515760"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1518737"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1537125"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1540167"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1552628"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1552631"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1553398"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1558450"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1560395"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1560399"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1560599"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1560614"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1560634"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1560643"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1575536"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1605048"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1622707"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1628389"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1633260"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1633399"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1634830"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1640722"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646937"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1648928"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3558.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5419"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5419"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5419"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20160803A.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5420"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5420"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5420"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20160803B.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5421"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5421"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5421"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20160803C.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7141"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7141"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7141"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20160907.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7167"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7167"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7167"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20160914.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-8615"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-8615"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8615"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20161102A.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-8616"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-8616"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8616"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20161102B.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-8617"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-8617"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8617"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20161102C.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-8618"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-8618"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8618"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20161102D.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-8619"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-8619"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8619"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20161102E.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-8620"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-8620"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8620"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20161102F.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-8621"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-8621"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8621"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20161102G.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-8622"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-8622"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8622"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20161102H.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-8623"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-8623"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8623"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20161102I.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-8624"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-8624"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8624"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20161102J.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-8625"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-8625"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8625"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20161102K.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-9586"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-9586"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-9586"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20161221A.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-7407"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-7407"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7407"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20170403.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-8816"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-8816"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8816"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_2017-12e7.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-8817"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-8817"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8817"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_2017-ae72.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-15710"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-15710"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15710"},{"type":"ARTICLE","url":"https://httpd.apache.org/security/vulnerabilities_24.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-15715"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-15715"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15715"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-1000100"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-1000100"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000100"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20170809B.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-1000101"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-1000101"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000101"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20170809A.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-1000254"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-1000254"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000254"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20171004.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-1000257"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-1000257"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000257"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20171023.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1283"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1283"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1283"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1301"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1301"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1301"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1303"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1303"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1303"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1312"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1312"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1312"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1333"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1333"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1333"},{"type":"ARTICLE","url":"https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2018-1333"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-11763"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-11763"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11763"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-14618"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-14618"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14618"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/CVE-2018-14618.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000007"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000007"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000007"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_2018-b3bf.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000120"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000120"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000120"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_2018-9cd6.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000121"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000121"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000121"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_2018-97a2.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000122"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000122"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000122"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_2018-b047.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000301"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000301"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000301"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_2018-b138.html"}],"affected":[{"package":{"name":"httpd24-curl","ecosystem":"Red Hat:rhel_software_collections:3::el6","purl":"pkg:rpm/redhat/httpd24-curl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.61.1-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-curl-debuginfo","ecosystem":"Red Hat:rhel_software_collections:3::el6","purl":"pkg:rpm/redhat/httpd24-curl-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.61.1-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-httpd","ecosystem":"Red Hat:rhel_software_collections:3::el6","purl":"pkg:rpm/redhat/httpd24-httpd"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.34-7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-httpd-debuginfo","ecosystem":"Red Hat:rhel_software_collections:3::el6","purl":"pkg:rpm/redhat/httpd24-httpd-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.34-7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-httpd-devel","ecosystem":"Red Hat:rhel_software_collections:3::el6","purl":"pkg:rpm/redhat/httpd24-httpd-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.34-7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-httpd-manual","ecosystem":"Red Hat:rhel_software_collections:3::el6","purl":"pkg:rpm/redhat/httpd24-httpd-manual"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.34-7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-httpd-tools","ecosystem":"Red Hat:rhel_software_collections:3::el6","purl":"pkg:rpm/redhat/httpd24-httpd-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.34-7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-libcurl","ecosystem":"Red Hat:rhel_software_collections:3::el6","purl":"pkg:rpm/redhat/httpd24-libcurl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.61.1-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-libcurl-devel","ecosystem":"Red Hat:rhel_software_collections:3::el6","purl":"pkg:rpm/redhat/httpd24-libcurl-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.61.1-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-libnghttp2","ecosystem":"Red Hat:rhel_software_collections:3::el6","purl":"pkg:rpm/redhat/httpd24-libnghttp2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.7.1-7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-libnghttp2-devel","ecosystem":"Red Hat:rhel_software_collections:3::el6","purl":"pkg:rpm/redhat/httpd24-libnghttp2-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.7.1-7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-mod_ldap","ecosystem":"Red Hat:rhel_software_collections:3::el6","purl":"pkg:rpm/redhat/httpd24-mod_ldap"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.34-7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-mod_proxy_html","ecosystem":"Red Hat:rhel_software_collections:3::el6","purl":"pkg:rpm/redhat/httpd24-mod_proxy_html"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.4.34-7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-mod_session","ecosystem":"Red Hat:rhel_software_collections:3::el6","purl":"pkg:rpm/redhat/httpd24-mod_session"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.34-7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-mod_ssl","ecosystem":"Red Hat:rhel_software_collections:3::el6","purl":"pkg:rpm/redhat/httpd24-mod_ssl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.4.34-7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-nghttp2","ecosystem":"Red Hat:rhel_software_collections:3::el6","purl":"pkg:rpm/redhat/httpd24-nghttp2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.7.1-7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-nghttp2-debuginfo","ecosystem":"Red Hat:rhel_software_collections:3::el6","purl":"pkg:rpm/redhat/httpd24-nghttp2-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.7.1-7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-curl","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/httpd24-curl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.61.1-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-curl-debuginfo","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/httpd24-curl-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.61.1-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-httpd","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/httpd24-httpd"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.34-7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-httpd-debuginfo","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/httpd24-httpd-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.34-7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-httpd-devel","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/httpd24-httpd-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.34-7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-httpd-manual","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/httpd24-httpd-manual"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.34-7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-httpd-tools","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/httpd24-httpd-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.34-7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-libcurl","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/httpd24-libcurl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.61.1-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-libcurl-devel","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/httpd24-libcurl-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.61.1-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-libnghttp2","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/httpd24-libnghttp2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.7.1-7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-libnghttp2-devel","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/httpd24-libnghttp2-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.7.1-7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-mod_ldap","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/httpd24-mod_ldap"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.34-7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-mod_md","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/httpd24-mod_md"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.34-7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-mod_proxy_html","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/httpd24-mod_proxy_html"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.4.34-7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-mod_session","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/httpd24-mod_session"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.34-7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-mod_ssl","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/httpd24-mod_ssl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.4.34-7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-nghttp2","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/httpd24-nghttp2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.7.1-7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}},{"package":{"name":"httpd24-nghttp2-debuginfo","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/httpd24-nghttp2-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.7.1-7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3558.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}