Show plain JSON{"affected_release": [{"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el8", "package": "jbcs-httpd24-apr-0:1.7.5-3.el8jbcs", "product_name": "JBoss Core Services for RHEL 8", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el8", "package": "jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs", "product_name": "JBoss Core Services for RHEL 8", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el8", "package": "jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs", "product_name": "JBoss Core Services for RHEL 8", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el8", "package": "jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs", "product_name": "JBoss Core Services for RHEL 8", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el8", "package": "jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el8jbcs", "product_name": "JBoss Core Services for RHEL 8", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el8", "package": "jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs", "product_name": "JBoss Core Services for RHEL 8", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el8", "package": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs", "product_name": "JBoss Core Services for RHEL 8", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el8", "package": "jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs", "product_name": "JBoss Core Services for RHEL 8", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-apr-0:1.7.5-3.el7jbcs", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-curl-0:8.11.0-2.el7jbcs", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-jansson-0:2.14-4.el7jbcs", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el7jbcs", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2025:3452", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2025-04-02T00:00:00Z"}, {"advisory": "RHSA-2024:8680", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "mod_http2-0:2.0.26-2.el9_4.1", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2024-10-31T00:00:00Z"}, {"advisory": "RHSA-2025:3453", "cpe": "cpe:/a:redhat:jboss_core_services:1", "package": "mod_http2", "product_name": "Text-Only JBCS", "release_date": "2025-04-02T00:00:00Z"}], "bugzilla": {"description": "mod_http2: DoS by null pointer in websocket over HTTP/2", "id": "2295006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295006"}, "csaw": false, "cvss3": {"cvss3_base_score": "3.7", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "status": "verified"}, "cwe": "CWE-476", "details": ["Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance.", "A flaw was found in the Apache HTTP Server. Serving WebSocket protocol upgrades over an HTTP/2 connection could result in a NULL pointer dereference, leading to a crash of the server process."], "mitigation": {"lang": "en:us", "value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."}, "name": "CVE-2024-36387", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:8", "fix_state": "Not affected", "package_name": "httpd:2.4/mod_http2", "product_name": "Red Hat Enterprise Linux 8"}], "public_date": "2024-07-01T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2024-36387\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36387\nhttps://httpd.apache.org/security/vulnerabilities_24.html"], "threat_severity": "Low"}