Bug 1668493 (CVE-2018-17199)
Summary: | CVE-2018-17199 httpd: mod_session_cookie does not respect expiry time | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Laura Pardo <lpardo> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | Maryna Nalbandian <mnalband> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | abhgupta, akaiser, dbaker, fhirtz, hhorak, huzaifas, jorton, krathod, luhliari, rfreire, security-response-team, sthangav, suarora, trankin, twalsh, yozone |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | httpd 2.4.38 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2019-11-20 18:51:13 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1668494, 1677496, 1677498, 1677590 | ||
Bug Blocks: | 1668499 |
Description
Laura Pardo
2019-01-22 21:21:11 UTC
Created httpd tracking bugs for this issue: Affects: fedora-all [bug 1668494] A review of this flaw was conducted and has been allocated a revised score to reflect the potential for exploiting session information when specific conditions are met. This issue has been addressed in the following products: Red Hat JBoss Core Services Via RHSA-2019:3935 https://access.redhat.com/errata/RHSA-2019:3935 This issue has been addressed in the following products: JBoss Core Services on RHEL 7 Via RHSA-2019:3933 https://access.redhat.com/errata/RHSA-2019:3933 This issue has been addressed in the following products: JBoss Core Services on RHEL 6 Via RHSA-2019:3932 https://access.redhat.com/errata/RHSA-2019:3932 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-17199 This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS Via RHSA-2019:4126 https://access.redhat.com/errata/RHSA-2019:4126 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:1121 https://access.redhat.com/errata/RHSA-2020:1121 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:1809 https://access.redhat.com/errata/RHSA-2021:1809 |