Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/jbcs-httpd24-openssl@1:1.0.2h-13.jbcs?arch=el7
purl pkg:rpm/redhat/jbcs-httpd24-openssl@1:1.0.2h-13.jbcs?arch=el7
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 10.0
Vulnerabilities affecting this package (11)
Vulnerability Summary Fixed by
VCID-2nmh-7tfa-zyb2
Aliases:
CVE-2016-0736
Prior to Apache HTTP release 2.4.25, mod_sessioncrypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC. An authentication tag (SipHash MAC) is now added to prevent such attacks. There are no reported fixed by versions.
VCID-fbj8-csfj-ayec
Aliases:
CVE-2016-2178
Multiple vulnerabilities have been found in OpenSSL, the worst of which allows attackers to conduct a time based side-channel attack. There are no reported fixed by versions.
VCID-fyfz-6tr5-2fc7
Aliases:
CVE-2017-5664
GHSA-jmvv-524f-hj5j
The error page mechanism of the Java Servlet Specification requires that, when an error occurs and an error page is configured for the error that occurred, the original request and response are forwarded to the error page. This means that the request is presented to the error page with the original HTTP method. If the error page is a static file, expected behaviour is to serve content of the file as if processing a GET request, regardless of the actual HTTP method. The Default Servlet in Apache Tomcat 9.0.0.M1 to 9.0.0.M20, 8.5.0 to 8.5.14, 8.0.0.RC1 to 8.0.43 and 7.0.0 to 7.0.77 did not do this. Depending on the original request this could lead to unexpected and undesirable results for static error pages including, if the DefaultServlet is configured to permit writes, the replacement or removal of the custom error page. Notes for other user provided error pages: (1) Unless explicitly coded otherwise, JSPs ignore the HTTP method. JSPs used as error pages must must ensure that they handle any error dispatch as a GET request, regardless of the actual method. (2) By default, the response generated by a Servlet does depend on the HTTP method. Custom Servlets used as error pages must ensure that they handle any error dispatch as a GET request, regardless of the actual method. There are no reported fixed by versions.
VCID-m1zd-uytj-3bej
Aliases:
CVE-2017-5647
GHSA-3gv7-3h64-78cm
A bug in the handling of the pipelined requests in Apache Tomcat 9.0.0.M1 to 9.0.0.M18, 8.5.0 to 8.5.12, 8.0.0.RC1 to 8.0.42, 7.0.0 to 7.0.76, and 6.0.0 to 6.0.52, when send file was used, results in the pipelined request being lost when send file processing of the previous request completed. This could result in responses appearing to be sent for the wrong request. For example, a user agent that sent requests A, B and C could see the correct response for request A, the response for request C for request B and no response for request C. There are no reported fixed by versions.
VCID-nsjj-szaq-1kgd
Aliases:
CVE-2016-6304
Multiple vulnerabilities have been found in OpenSSL, the worst of which allows attackers to conduct a time based side-channel attack. There are no reported fixed by versions.
VCID-pbjc-7myj-tqas
Aliases:
CVE-2016-8610
security update There are no reported fixed by versions.
VCID-pc2n-ga7g-byga
Aliases:
CVE-2016-8743
Apache HTTP Server, prior to release 2.4.25 (and 2.2.32), accepted a broad pattern of unusual whitespace patterns from the user-agent, including bare CR, FF, VTAB in parsing the request line and request header lines, as well as HTAB in parsing the request line. Any bare CR present in request lines was treated as whitespace and remained in the request field member "the_request", while a bare CR in the request header field name would be honored as whitespace, and a bare CR in the request header field value was retained the input headers array. Implied additional whitespace was accepted in the request line and prior to the ':' delimiter of any request header lines. RFC7230 Section 3.5 calls out some of these whitespace exceptions, and section 3.2.3 eliminated and clarified the role of implied whitespace in the grammer of this specification. Section 3.1.1 requires exactly one single SP between the method and request-target, and between the request-target and HTTP-version, followed immediately by a CRLF sequence. None of these fields permit any (unencoded) CTL character whatsoever. Section 3.2.4 explicitly disallowed any whitespace from the request header field prior to the ':' character, while Section 3.2 disallows all CTL characters in the request header line other than the HTAB character as whitespace. These defects represent a security concern when httpd is participating in any chain of proxies or interacting with back-end application servers, either through mod_proxy or using conventional CGI mechanisms. In each case where one agent accepts such CTL characters and does not treat them as whitespace, there is the possiblity in a proxy chain of generating two responses from a server behind the uncautious proxy agent. In a sequence of two requests, this results in request A to the first proxy being interpreted as requests A + A' by the backend server, and if requests A and B were submitted to the first proxy in a keepalive connection, the proxy may interpret response A' as the response to request B, polluting the cache or potentially serving the A' content to a different downstream user-agent. These defects are addressed with the release of Apache HTTP Server 2.4.25 and coordinated by a new directive; HttpProtocolOptions Strict which is the default behavior of 2.4.25 and later. By toggling from 'Strict' behavior to 'Unsafe' behavior, some of the restrictions may be relaxed to allow some invalid HTTP/1.1 clients to communicate with the server, but this will reintroduce the possibility of the problems described in this assessment. Note that relaxing the behavior to 'Unsafe' will still not permit raw CTLs other than HTAB (where permitted), but will allow other RFC requirements to not be enforced, such as exactly two SP characters in the request line. There are no reported fixed by versions.
VCID-r616-sqha-pudt
Aliases:
CVE-2016-2177
Multiple vulnerabilities have been found in OpenSSL, the worst of which allows attackers to conduct a time based side-channel attack. There are no reported fixed by versions.
VCID-rfqy-e7pv-dyfy
Aliases:
CVE-2016-2161
Malicious input to mod_auth_digest will cause the server to crash, and each instance continues to crash even for subsequently valid requests. There are no reported fixed by versions.
VCID-tkm7-pyue-7ffj
Aliases:
CVE-2016-8740
The HTTP/2 protocol implementation (mod_http2) had an incomplete handling of the LimitRequestFields directive. This allowed an attacker to inject unlimited request headers into the server, leading to eventual memory exhaustion. There are no reported fixed by versions.
VCID-zypm-ffez-dqbz
Aliases:
CVE-2016-7056
security update There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T14:36:42.173358+00:00 RedHat Importer Affected by VCID-r616-sqha-pudt https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2177.json 38.0.0
2026-04-01T14:36:31.423037+00:00 RedHat Importer Affected by VCID-fbj8-csfj-ayec https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2178.json 38.0.0
2026-04-01T14:34:38.681992+00:00 RedHat Importer Affected by VCID-nsjj-szaq-1kgd https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6304.json 38.0.0
2026-04-01T14:33:57.617587+00:00 RedHat Importer Affected by VCID-pbjc-7myj-tqas https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8610.json 38.0.0
2026-04-01T14:33:05.861669+00:00 RedHat Importer Affected by VCID-tkm7-pyue-7ffj https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8740.json 38.0.0
2026-04-01T14:32:52.518116+00:00 RedHat Importer Affected by VCID-pc2n-ga7g-byga https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8743.json 38.0.0
2026-04-01T14:32:52.303260+00:00 RedHat Importer Affected by VCID-rfqy-e7pv-dyfy https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2161.json 38.0.0
2026-04-01T14:32:52.090524+00:00 RedHat Importer Affected by VCID-2nmh-7tfa-zyb2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0736.json 38.0.0
2026-04-01T14:32:39.580621+00:00 RedHat Importer Affected by VCID-zypm-ffez-dqbz https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7056.json 38.0.0
2026-04-01T14:31:12.311452+00:00 RedHat Importer Affected by VCID-m1zd-uytj-3bej https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5647.json 38.0.0
2026-04-01T14:30:48.508536+00:00 RedHat Importer Affected by VCID-fyfz-6tr5-2fc7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5664.json 38.0.0