Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/jbcs-httpd24-openssl@1:1.1.1g-8?arch=el8jbcs
purl pkg:rpm/redhat/jbcs-httpd24-openssl@1:1.1.1g-8?arch=el8jbcs
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.0
Vulnerabilities affecting this package (13)
Vulnerability Summary Fixed by
VCID-17hy-4ppt-xyhw
Aliases:
CVE-2021-26691
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted SessionHeader sent by an origin server could cause a heap overflow There are no reported fixed by versions.
VCID-2bxd-tp78-aked
Aliases:
CVE-2021-3688
JBCS: URL normalization issue with dot-dot-semicolon(s) leads to information disclosure There are no reported fixed by versions.
VCID-66k7-maf9-dfcd
Aliases:
CVE-2020-35452
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow There are no reported fixed by versions.
VCID-6ptm-71xf-eqgp
Aliases:
CVE-2021-23840
GHSA-qgm6-9472-pwq7
Multiple vulnerabilities have been found in OpenSSL, the worst of which could allow remote attackers to cause a Denial of Service condition. There are no reported fixed by versions.
VCID-8zet-k3h4-3kba
Aliases:
CVE-2019-20838
pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 There are no reported fixed by versions.
VCID-9u53-b79b-cfgd
Aliases:
CVE-2021-34798
Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier. There are no reported fixed by versions.
VCID-9ych-ybpr-j3h6
Aliases:
CVE-2020-13950
Apache HTTP Server versions 2.4.41 to 2.4.46 mod_proxy_http can be made to crash (NULL pointer dereference) with specially crafted requests using both Content-Length and Transfer-Encoding headers, leading to a Denial of Service There are no reported fixed by versions.
VCID-bvkg-nrwd-e7g8
Aliases:
CVE-2021-26690
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service There are no reported fixed by versions.
VCID-eupp-h1mx-13dy
Aliases:
CVE-2020-14155
pcre: Integer overflow when parsing callout numeric arguments There are no reported fixed by versions.
VCID-f2y3-s6j8-7ygr
Aliases:
CVE-2019-17567
Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured. There are no reported fixed by versions.
VCID-g6xr-qtwz-2yaq
Aliases:
CVE-2021-30641
Apache HTTP Server versions 2.4.39 to 2.4.46 Unexpected matching behavior with 'MergeSlashes OFF' There are no reported fixed by versions.
VCID-nr5y-ve9m-zfeh
Aliases:
CVE-2021-3712
GHSA-q9wj-f4qw-6vfj
Out-of-bounds Read ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y). There are no reported fixed by versions.
VCID-q6vs-dmwa-9fhh
Aliases:
CVE-2021-23841
GHSA-84rm-qf37-fgc2
Multiple vulnerabilities have been found in OpenSSL, the worst of which could allow remote attackers to cause a Denial of Service condition. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T14:06:10.451642+00:00 RedHat Importer Affected by VCID-8zet-k3h4-3kba https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20838.json 38.0.0
2026-04-01T14:06:09.946087+00:00 RedHat Importer Affected by VCID-eupp-h1mx-13dy https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14155.json 38.0.0
2026-04-01T14:03:12.052013+00:00 RedHat Importer Affected by VCID-6ptm-71xf-eqgp https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23840.json 38.0.0
2026-04-01T14:03:11.240815+00:00 RedHat Importer Affected by VCID-q6vs-dmwa-9fhh https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23841.json 38.0.0
2026-04-01T14:02:09.575168+00:00 RedHat Importer Affected by VCID-g6xr-qtwz-2yaq https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30641.json 38.0.0
2026-04-01T14:02:09.128171+00:00 RedHat Importer Affected by VCID-f2y3-s6j8-7ygr https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17567.json 38.0.0
2026-04-01T14:02:08.720197+00:00 RedHat Importer Affected by VCID-9ych-ybpr-j3h6 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13950.json 38.0.0
2026-04-01T14:02:08.261158+00:00 RedHat Importer Affected by VCID-17hy-4ppt-xyhw https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26691.json 38.0.0
2026-04-01T14:02:07.751884+00:00 RedHat Importer Affected by VCID-bvkg-nrwd-e7g8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26690.json 38.0.0
2026-04-01T14:02:07.292646+00:00 RedHat Importer Affected by VCID-66k7-maf9-dfcd https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35452.json 38.0.0
2026-04-01T14:01:41.992153+00:00 RedHat Importer Affected by VCID-2bxd-tp78-aked https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3688.json 38.0.0
2026-04-01T14:01:31.732868+00:00 RedHat Importer Affected by VCID-nr5y-ve9m-zfeh https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json 38.0.0
2026-04-01T14:01:24.320146+00:00 RedHat Importer Affected by VCID-9u53-b79b-cfgd https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-34798.json 38.0.0