Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2007-5342
Vulnerability from cvelistv5
Published
2007-12-27 22:00
Modified
2024-08-07 15:24
Severity ?
EPSS score ?
Summary
The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:24:42.402Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "30676", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30676" }, { "name": "RHSA-2008:0862", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0862.html" }, { "name": "28915", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28915" }, { "name": "ADV-2008-2823", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2823" }, { "name": "oval:org.mitre.oval:def:10417", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417" }, { "name": "37460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37460" }, { "name": "29313", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29313" }, { "name": "31681", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31681" }, { "name": "32120", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32120" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "RHSA-2008:0042", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0042.html" }, { "name": "28274", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28274" }, { "name": "MDVSA-2008:188", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188" }, { "name": "28317", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28317" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm" }, { "name": "3485", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3485" }, { "name": "20071223 [CVE-2007-5342] Apache Tomcat\u0027s default security policy is too open", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/485481/100/0/threaded" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "SUSE-SR:2009:004", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tomcat.apache.org/security-6.html" }, { "name": "RHSA-2008:0832", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0832.html" }, { "name": "57126", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57126" }, { "name": "32222", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32222" }, { "name": "RHSA-2008:0195", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html" }, { "name": "FEDORA-2008-1467", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html" }, { "name": "GLSA-200804-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200804-10.xml" }, { "name": "apache-juli-logging-weak-security(39201)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39201" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=rev\u0026revision=606594" }, { "name": "RHSA-2008:0833", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0833.html" }, { "name": "FEDORA-2008-1603", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html" }, { "name": "ADV-2008-1856", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1856/references" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tomcat.apache.org/security-5.html" }, { "name": "39833", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/39833" }, { "name": "ADV-2008-0013", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0013" }, { "name": "ADV-2008-2780", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "name": "RHSA-2008:0831", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0831.html" }, { "name": "27006", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27006" }, { "name": "RHSA-2008:0834", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0834.html" }, { "name": "DSA-1447", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1447" }, { "name": "HPSBST02955", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2" }, { "name": "APPLE-SA-2008-10-09", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3216" }, { "name": "29711", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29711" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "32266", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32266" }, { "name": "[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-12-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-13T16:08:47", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "30676", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30676" }, { "name": "RHSA-2008:0862", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0862.html" }, { "name": "28915", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28915" }, { "name": "ADV-2008-2823", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2823" }, { "name": "oval:org.mitre.oval:def:10417", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417" }, { "name": "37460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37460" }, { "name": "29313", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29313" }, { "name": "31681", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31681" }, { "name": "32120", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32120" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "RHSA-2008:0042", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0042.html" }, { "name": "28274", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28274" }, { "name": "MDVSA-2008:188", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188" }, { "name": "28317", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28317" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm" }, { "name": "3485", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3485" }, { "name": "20071223 [CVE-2007-5342] Apache Tomcat\u0027s default security policy is too open", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/485481/100/0/threaded" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "SUSE-SR:2009:004", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tomcat.apache.org/security-6.html" }, { "name": "RHSA-2008:0832", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0832.html" }, { "name": "57126", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57126" }, { "name": "32222", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32222" }, { "name": "RHSA-2008:0195", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html" }, { "name": "FEDORA-2008-1467", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html" }, { "name": "GLSA-200804-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200804-10.xml" }, { "name": "apache-juli-logging-weak-security(39201)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39201" }, { "tags": [ "x_refsource_MISC" ], "url": "http://svn.apache.org/viewvc?view=rev\u0026revision=606594" }, { "name": "RHSA-2008:0833", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0833.html" }, { "name": "FEDORA-2008-1603", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html" }, { "name": "ADV-2008-1856", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1856/references" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tomcat.apache.org/security-5.html" }, { "name": "39833", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/39833" }, { "name": "ADV-2008-0013", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0013" }, { "name": "ADV-2008-2780", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "name": "RHSA-2008:0831", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0831.html" }, { "name": "27006", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27006" }, { "name": "RHSA-2008:0834", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0834.html" }, { "name": "DSA-1447", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1447" }, { "name": "HPSBST02955", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2" }, { "name": "APPLE-SA-2008-10-09", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3216" }, { "name": "29711", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29711" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "32266", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32266" }, { "name": "[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2007-5342", "datePublished": "2007-12-27T22:00:00", "dateReserved": "2007-10-10T00:00:00", "dateUpdated": "2024-08-07T15:24:42.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2007-5342\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2007-12-27T22:46:00.000\",\"lastModified\":\"2024-11-21T00:37:41.777\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.\"},{\"lang\":\"es\",\"value\":\"La catalina.policy por defecto en el componente de acceso JULI de Apache Tomcat 5.5.9 hasta 5.5.25 y 6.0.0 hasta 6.0.15 no restringe determinados permisos para aplicaciones web, lo cual permite a atacantes remotos modificar opciones de configuraci\u00f3n de acceso y sobrescribir ficheros de su elecci\u00f3n, como se demuestra cambiando los atributos (1) level, (2) directory, y (3) prefix en el gestor org.apache.juli.FileHandler.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:N\",\"baseScore\":6.4,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B0C01D5-773F-469C-9E69-170C2844AAA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB03FDFB-4DBF-4B70-BFA3-570D1DE67695\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F5CF79C-759B-4FF9-90EE-847264059E93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"357651FD-392E-4775-BF20-37A23B3ABAE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585B9476-6B86-4809-9B9E-26112114CB59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6145036D-4FCE-4EBE-A137-BDFA69BA54F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E437055A-0A81-413F-AB08-0E9D0DC9EA30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9276A093-9C98-4617-9941-2276995F5848\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97C9C36C-EF7E-4D42-9749-E2FF6CE35A2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C98575E2-E39A-4A8F-B5B5-BD280B8367BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BDA08E7-A417-44E8-9C89-EB22BEEC3B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCD1B6BE-CF07-4DA8-A703-4A48506C8AD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5878E08E-2741-4798-94E9-BA8E07386B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69F6BAB7-C099-4345-A632-7287AEA555B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3AAF031-D16B-4D51-9581-2D1376A5157B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51120689-F5C0-4DF1-91AA-314C40A46C58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F67477AB-85F6-421C-9C0B-C8EFB1B200CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D11D6FB7-CBDB-48C1-98CB-1B3CAA36C5D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F28C7801-41B9-4552-BA1E-577967BCBBEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25B21085-7259-4685-9D1F-FF98E6489E10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"635EE321-2A1F-4FF8-95BE-0C26591969D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A81B035-8598-4D2C-B45F-C6C9D4B10C2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1096947-82A6-4EA8-A4F2-00D91E3F7DAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EBFA1D3-16A6-4041-BB30-51D2EE0F2AF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B70B372F-EFFD-4AF7-99B5-7D1B23A0C54C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C95ADA4-66F5-45C4-A677-ACE22367A75A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11951A10-39A2-4FF5-8C43-DF94730FB794\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"351E5BCF-A56B-4D91-BA3C-21A4B77D529A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DC2BBB4-171E-4EFF-A575-A5B7FF031755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B6B0504-27C1-4824-A928-A878CBBAB32D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE81AD36-ACD1-4C6C-8E7C-5326D1DA3045\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D903956B-14F5-4177-AF12-0A5F1846D3C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81F847DC-A2F5-456C-9038-16A0E85F4C3B\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://osvdb.org/39833\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28274\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28317\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28915\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/29313\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/29711\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/30676\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/32120\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/32222\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/32266\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/37460\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/57126\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200804-10.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securityreason.com/securityalert/3485\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT3216\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://svn.apache.org/viewvc?view=rev\u0026revision=606594\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://tomcat.apache.org/security-5.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://tomcat.apache.org/security-6.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1447\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:188\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0042.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0195.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0831.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0832.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0833.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0834.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0862.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/485481/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/27006\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/31681\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2008-0010.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0013\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1856/references\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2780\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2823\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/39201\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/39833\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28274\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28317\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28915\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/29313\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/29711\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30676\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32120\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32222\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32266\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/37460\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/57126\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200804-10.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securityreason.com/securityalert/3485\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT3216\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://svn.apache.org/viewvc?view=rev\u0026revision=606594\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://tomcat.apache.org/security-5.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://tomcat.apache.org/security-6.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1447\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:188\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0042.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0195.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0831.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0832.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0833.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0834.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0862.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/485481/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/27006\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/31681\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2008-0010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0013\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1856/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2780\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2823\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/39201\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
gsd-2007-5342
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2007-5342", "description": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.", "id": "GSD-2007-5342", "references": [ "https://www.suse.com/security/cve/CVE-2007-5342.html", "https://www.debian.org/security/2008/dsa-1447", "https://access.redhat.com/errata/RHSA-2008:0862", "https://access.redhat.com/errata/RHSA-2008:0834", "https://access.redhat.com/errata/RHSA-2008:0833", "https://access.redhat.com/errata/RHSA-2008:0832", "https://access.redhat.com/errata/RHSA-2008:0831", "https://access.redhat.com/errata/RHSA-2008:0195", "https://access.redhat.com/errata/RHSA-2008:0042", "https://linux.oracle.com/cve/CVE-2007-5342.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2007-5342" ], "details": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.", "id": "GSD-2007-5342", "modified": "2023-12-13T01:21:40.418310Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2007-5342", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://secunia.com/advisories/37460", "refsource": "MISC", "url": "http://secunia.com/advisories/37460" }, { "name": "http://tomcat.apache.org/security-5.html", "refsource": "MISC", "url": "http://tomcat.apache.org/security-5.html" }, { "name": "http://tomcat.apache.org/security-6.html", "refsource": "MISC", "url": "http://tomcat.apache.org/security-6.html" }, { "name": "http://www.securityfocus.com/archive/1/507985/100/0/threaded", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "MISC", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "http://www.vupen.com/english/advisories/2009/3316", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E", "refsource": "MISC", "url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E" }, { "name": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E", "refsource": "MISC", "url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E" }, { "name": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E", "refsource": "MISC", "url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E" }, { "name": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E", "refsource": "MISC", "url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E" }, { "name": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "name": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2" }, { "name": "http://osvdb.org/39833", "refsource": "MISC", "url": "http://osvdb.org/39833" }, { "name": "http://secunia.com/advisories/28274", "refsource": "MISC", "url": "http://secunia.com/advisories/28274" }, { "name": "http://secunia.com/advisories/28317", "refsource": "MISC", "url": "http://secunia.com/advisories/28317" }, { "name": "http://secunia.com/advisories/28915", "refsource": "MISC", "url": "http://secunia.com/advisories/28915" }, { "name": "http://secunia.com/advisories/29313", "refsource": "MISC", "url": "http://secunia.com/advisories/29313" }, { "name": "http://secunia.com/advisories/29711", "refsource": "MISC", "url": "http://secunia.com/advisories/29711" }, { "name": "http://secunia.com/advisories/30676", "refsource": "MISC", "url": "http://secunia.com/advisories/30676" }, { "name": "http://secunia.com/advisories/32120", "refsource": "MISC", "url": "http://secunia.com/advisories/32120" }, { "name": "http://secunia.com/advisories/32222", "refsource": "MISC", "url": "http://secunia.com/advisories/32222" }, { "name": "http://secunia.com/advisories/32266", "refsource": "MISC", "url": "http://secunia.com/advisories/32266" }, { "name": "http://secunia.com/advisories/57126", "refsource": "MISC", "url": "http://secunia.com/advisories/57126" }, { "name": "http://security.gentoo.org/glsa/glsa-200804-10.xml", "refsource": "MISC", "url": "http://security.gentoo.org/glsa/glsa-200804-10.xml" }, { "name": "http://securityreason.com/securityalert/3485", "refsource": "MISC", "url": "http://securityreason.com/securityalert/3485" }, { "name": "http://support.apple.com/kb/HT3216", "refsource": "MISC", "url": "http://support.apple.com/kb/HT3216" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm", "refsource": "MISC", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm" }, { "name": "http://svn.apache.org/viewvc?view=rev\u0026revision=606594", "refsource": "MISC", "url": "http://svn.apache.org/viewvc?view=rev\u0026revision=606594" }, { "name": "http://www.debian.org/security/2008/dsa-1447", "refsource": "MISC", "url": "http://www.debian.org/security/2008/dsa-1447" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188" }, { "name": "http://www.redhat.com/support/errata/RHSA-2008-0042.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2008-0042.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2008-0195.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2008-0831.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2008-0831.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2008-0832.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2008-0832.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2008-0833.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2008-0833.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2008-0834.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2008-0834.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2008-0862.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2008-0862.html" }, { "name": "http://www.securityfocus.com/archive/1/485481/100/0/threaded", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/485481/100/0/threaded" }, { "name": "http://www.securityfocus.com/bid/27006", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/27006" }, { "name": "http://www.securityfocus.com/bid/31681", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/31681" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html", "refsource": "MISC", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html" }, { "name": "http://www.vupen.com/english/advisories/2008/0013", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2008/0013" }, { "name": "http://www.vupen.com/english/advisories/2008/1856/references", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2008/1856/references" }, { "name": "http://www.vupen.com/english/advisories/2008/2780", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "name": "http://www.vupen.com/english/advisories/2008/2823", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2008/2823" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39201", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39201" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417" }, { "name": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html", "refsource": "MISC", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html" }, { "name": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html", "refsource": "MISC", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2007-5342" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "http://svn.apache.org/viewvc?view=rev\u0026revision=606594", "refsource": "MISC", "tags": [], "url": "http://svn.apache.org/viewvc?view=rev\u0026revision=606594" }, { "name": "http://tomcat.apache.org/security-5.html", "refsource": "CONFIRM", "tags": [], "url": "http://tomcat.apache.org/security-5.html" }, { "name": "http://tomcat.apache.org/security-6.html", "refsource": "CONFIRM", "tags": [], "url": "http://tomcat.apache.org/security-6.html" }, { "name": "27006", "refsource": "BID", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/27006" }, { "name": "DSA-1447", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2008/dsa-1447" }, { "name": "28274", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/28274" }, { "name": "28317", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/28317" }, { "name": "3485", "refsource": "SREASON", "tags": [], "url": "http://securityreason.com/securityalert/3485" }, { "name": "FEDORA-2008-1467", "refsource": "FEDORA", "tags": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html" }, { "name": "FEDORA-2008-1603", "refsource": "FEDORA", "tags": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html" }, { "name": "28915", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/28915" }, { "name": "RHSA-2008:0042", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0042.html" }, { "name": "29313", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/29313" }, { "name": "GLSA-200804-10", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-200804-10.xml" }, { "name": "29711", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/29711" }, { "name": "RHSA-2008:0195", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html" }, { "name": "30676", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/30676" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html" }, { "name": "MDVSA-2008:188", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188" }, { "name": "RHSA-2008:0862", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0862.html" }, { "name": "31681", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/31681" }, { "name": "APPLE-SA-2008-10-09", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "name": "32222", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/32222" }, { "name": "http://support.apple.com/kb/HT3216", "refsource": "CONFIRM", "tags": [], "url": "http://support.apple.com/kb/HT3216" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm", "refsource": "CONFIRM", "tags": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm" }, { "name": "39833", "refsource": "OSVDB", "tags": [], "url": "http://osvdb.org/39833" }, { "name": "32120", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/32120" }, { "name": "SUSE-SR:2009:004", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "name": "32266", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/32266" }, { "name": "RHSA-2008:0831", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0831.html" }, { "name": "RHSA-2008:0833", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0833.html" }, { "name": "RHSA-2008:0834", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0834.html" }, { "name": "RHSA-2008:0832", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0832.html" }, { "name": "ADV-2009-3316", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "37460", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/37460" }, { "name": "ADV-2008-2823", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/2823" }, { "name": "ADV-2008-1856", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/1856/references" }, { "name": "ADV-2008-0013", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/0013" }, { "name": "ADV-2008-2780", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "name": "HPSBST02955", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2" }, { "name": "57126", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/57126" }, { "name": "apache-juli-logging-weak-security(39201)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39201" }, { "name": "oval:org.mitre.oval:def:10417", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "20071223 [CVE-2007-5342] Apache Tomcat\u0027s default security policy is too open", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/485481/100/0/threaded" }, { "name": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E", "refsource": "MISC", "tags": [], "url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E" }, { "name": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E", "refsource": "MISC", "tags": [], "url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E" }, { "name": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E", "refsource": "MISC", "tags": [], "url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E" }, { "name": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E", "refsource": "MISC", "tags": [], "url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T02:18Z", "publishedDate": "2007-12-27T22:46Z" } } }
rhsa-2008_0862
Vulnerability from csaf_redhat
Published
2008-10-02 14:03
Modified
2024-11-22 02:13
Summary
Red Hat Security Advisory: tomcat security update
Notes
Topic
Updated tomcat packages that fix several security issues are now available
for Red Hat Application Server v2.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
Apache Tomcat is a servlet container for the Java Servlet and JavaServer
Pages (JSP) technologies.
The default security policy in the JULI logging component did not restrict
access permissions to files. This could be misused by untrusted web
applications to access and write arbitrary files in the context of the
Tomcat process. (CVE-2007-5342)
A directory traversal vulnerability was discovered in the Apache Tomcat
webdav servlet. Under certain configurations, this allowed remote,
authenticated users to read files accessible to the local Tomcat process.
(CVE-2007-5461)
A cross-site scripting vulnerability was discovered in the
HttpServletResponse.sendError() method. A remote attacker could inject
arbitrary web script or HTML via forged HTTP headers. (CVE-2008-1232)
An additional cross-site scripting vulnerability was discovered in the host
manager application. A remote attacker could inject arbitrary web script or
HTML via the hostname parameter. (CVE-2008-1947)
A traversal vulnerability was discovered when using a RequestDispatcher
in combination with a servlet or JSP. A remote attacker could utilize a
specially-crafted request parameter to access protected web resources.
(CVE-2008-2370)
An additional traversal vulnerability was discovered when the
"allowLinking" and "URIencoding" settings were activated. A remote attacker
could use a UTF-8-encoded request to extend their privileges and obtain
local files accessible to the Tomcat process. (CVE-2008-2938)
Users of tomcat should upgrade to these updated packages, which contain
backported patches to resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated tomcat packages that fix several security issues are now available\nfor Red Hat Application Server v2.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\nTomcat process. (CVE-2007-5342)\n\nA directory traversal vulnerability was discovered in the Apache Tomcat\nwebdav servlet. Under certain configurations, this allowed remote,\nauthenticated users to read files accessible to the local Tomcat process.\n(CVE-2007-5461)\n\nA cross-site scripting vulnerability was discovered in the\nHttpServletResponse.sendError() method. A remote attacker could inject\narbitrary web script or HTML via forged HTTP headers. (CVE-2008-1232)\n\nAn additional cross-site scripting vulnerability was discovered in the host\nmanager application. A remote attacker could inject arbitrary web script or\nHTML via the hostname parameter. (CVE-2008-1947)\n\nA traversal vulnerability was discovered when using a RequestDispatcher\nin combination with a servlet or JSP. A remote attacker could utilize a\nspecially-crafted request parameter to access protected web resources.\n(CVE-2008-2370)\n\nAn additional traversal vulnerability was discovered when the\n\"allowLinking\" and \"URIencoding\" settings were activated. A remote attacker\ncould use a UTF-8-encoded request to extend their privileges and obtain\nlocal files accessible to the Tomcat process. (CVE-2008-2938)\n\nUsers of tomcat should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0862", "url": "https://access.redhat.com/errata/RHSA-2008:0862" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://tomcat.apache.org/security-5.html", "url": "http://tomcat.apache.org/security-5.html" }, { "category": "external", "summary": "333791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791" }, { "category": "external", "summary": "427216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216" }, { "category": "external", "summary": "446393", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=446393" }, { "category": "external", "summary": "456120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456120" }, { "category": "external", "summary": "457597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=457597" }, { "category": "external", "summary": "457934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=457934" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0862.json" } ], "title": "Red Hat Security Advisory: tomcat security update", "tracking": { "current_release_date": "2024-11-22T02:13:30+00:00", "generator": { "date": "2024-11-22T02:13:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0862", "initial_release_date": "2008-10-02T14:03:00+00:00", "revision_history": [ { "date": "2008-10-02T14:03:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-10-02T10:03:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:13:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Application Server v2 4AS", "product": { "name": "Red Hat Application Server v2 4AS", "product_id": "4AS-RHAPS2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_application_server:2" } } }, { "category": "product_name", "name": "Red Hat Application Server v2 4ES", "product": { "name": "Red Hat Application Server v2 4ES", "product_id": "4ES-RHAPS2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_application_server:2" } } }, { "category": "product_name", "name": "Red Hat Application Server v2 4WS", "product": { "name": "Red Hat Application Server v2 4WS", "product_id": "4WS-RHAPS2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_application_server:2" } } } ], "category": "product_family", "name": "Red Hat Application Server" }, { "branches": [ { "category": "product_version", "name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "product": { "name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "product_id": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp_4rh.9?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "product": { "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "product_id": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_4rh.9?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp_4rh.9?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp_4rh.9?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "product": { "name": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "product_id": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.9?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_4rh.9?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "product": { "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "product_id": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_4rh.9?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "product": { "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "product_id": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_4rh.9?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp_4rh.9?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "product": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp_4rh.9?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_4rh.9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp_4rh.9.src", "product": { "name": "tomcat5-0:5.5.23-0jpp_4rh.9.src", "product_id": "tomcat5-0:5.5.23-0jpp_4rh.9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.9?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS", "product_id": "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4AS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp_4rh.9.src as a component of Red Hat Application Server v2 4AS", "product_id": "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src" }, "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.src", "relates_to_product_reference": "4AS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS", "product_id": "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4AS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS", "product_id": "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4AS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS", "product_id": "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4AS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS", "product_id": "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4AS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS", "product_id": "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4AS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS", "product_id": "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4AS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS", "product_id": "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4AS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS", "product_id": "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4AS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS", "product_id": "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4AS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS", "product_id": "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4AS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES", "product_id": "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4ES-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp_4rh.9.src as a component of Red Hat Application Server v2 4ES", "product_id": "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src" }, "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.src", "relates_to_product_reference": "4ES-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES", "product_id": "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4ES-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES", "product_id": "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4ES-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES", "product_id": "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4ES-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES", "product_id": "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4ES-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES", "product_id": "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4ES-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES", "product_id": "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4ES-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES", "product_id": "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4ES-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES", "product_id": "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4ES-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES", "product_id": "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4ES-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES", "product_id": "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4ES-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS", "product_id": "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4WS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp_4rh.9.src as a component of Red Hat Application Server v2 4WS", "product_id": "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src" }, "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.src", "relates_to_product_reference": "4WS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS", "product_id": "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4WS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS", "product_id": "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4WS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS", "product_id": "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4WS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS", "product_id": "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4WS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS", "product_id": "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4WS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS", "product_id": "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4WS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS", "product_id": "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4WS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS", "product_id": "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4WS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS", "product_id": "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4WS-RHAPS2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS", "product_id": "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "relates_to_product_reference": "4WS-RHAPS2" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-5342", "discovery_date": "2007-10-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "427216" } ], "notes": [ { "category": "description", "text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.", "title": "Vulnerability description" }, { "category": "summary", "text": "Apache Tomcat\u0027s default security policy is too open", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5342" }, { "category": "external", "summary": "RHBZ#427216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5342" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342" } ], "release_date": "2007-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-10-02T14:03:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0862" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Apache Tomcat\u0027s default security policy is too open" }, { "cve": "CVE-2007-5461", "discovery_date": "2007-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "333791" } ], "notes": [ { "category": "description", "text": "Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.", "title": "Vulnerability description" }, { "category": "summary", "text": "Absolute path traversal Apache Tomcat WEBDAV", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5461" }, { "category": "external", "summary": "RHBZ#333791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5461", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5461" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461" } ], "release_date": "2007-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-10-02T14:03:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0862" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Absolute path traversal Apache Tomcat WEBDAV" }, { "cve": "CVE-2008-1232", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2008-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "457597" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Cross-Site-Scripting enabled by sendError call", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1232" }, { "category": "external", "summary": "RHBZ#457597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=457597" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1232", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1232" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1232", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1232" } ], "release_date": "2008-08-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-10-02T14:03:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0862" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: Cross-Site-Scripting enabled by sendError call" }, { "cve": "CVE-2008-1947", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2008-05-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "446393" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Apache Tomcat 5.5.9 through 5.5.26 and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via the name parameter (aka the hostname attribute) to host-manager/html/add.", "title": "Vulnerability description" }, { "category": "summary", "text": "Tomcat host manager xss - name field", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1947" }, { "category": "external", "summary": "RHBZ#446393", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=446393" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1947", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1947" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1947", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1947" } ], "release_date": "2008-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-10-02T14:03:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0862" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Tomcat host manager xss - name field" }, { "cve": "CVE-2008-2370", "discovery_date": "2008-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "457934" } ], "notes": [ { "category": "description", "text": "Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat RequestDispatcher information disclosure vulnerability", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-2370" }, { "category": "external", "summary": "RHBZ#457934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=457934" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2370", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2370" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2370", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2370" } ], "release_date": "2008-08-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-10-02T14:03:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0862" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat RequestDispatcher information disclosure vulnerability" }, { "cve": "CVE-2008-2938", "discovery_date": "2008-07-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "456120" } ], "notes": [ { "category": "description", "text": "Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370. NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat Unicode directory traversal vulnerability", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-2938" }, { "category": "external", "summary": "RHBZ#456120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2938", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2938" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2938", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2938" } ], "release_date": "2008-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-10-02T14:03:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src", "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch", "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0862" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat Unicode directory traversal vulnerability" } ] }
rhsa-2008_0833
Vulnerability from csaf_redhat
Published
2008-09-22 12:50
Modified
2024-11-22 02:13
Summary
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0CP04 security update
Notes
Topic
Updated JBoss Enterprise Application Platform (JBEAP) 4.2 packages that fix
various security issues are now available for Red Hat Enterprise Linux 4 as
JBEAP 4.2.0.CP04.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Details
JBoss Enterprise Application Platform is the market leading platform for
innovative and scalable Java applications; integrating the JBoss
Application Server, with JBoss Hibernate and JBoss Seam into a complete,
simple enterprise solution.
This release of JBEAP for Red Hat Enterprise Linux 4 serves as a
replacement to JBEAP 4.2.0.CP03.
These updated packages include bug fixes and enhancements which are
detailed in the release notes. The link to the release notes is available
below in the References section.
The following security issues are also fixed with this release:
The default security policy in the JULI logging component did not restrict
access permissions to files. This could be misused by untrusted web
applications to access and write arbitrary files in the context of the
tomcat process. (CVE-2007-5342)
The property that controls the download of server classes was set to "true"
in the "production" configuration. When the class download service is bound
to an external interface, a remote attacker was able to download arbitrary
class files from the server class path. (CVE-2008-3519)
Warning: before applying this update, please backup the JBEAP
"server/[configuration]/deploy/" directory, and any other customized
configuration files.
All users of JBEAP 4.2 on Red Hat Enterprise Linux 4 are advised to upgrade
to these updated packages, which resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.2 packages that fix\nvarious security issues are now available for Red Hat Enterprise Linux 4 as\nJBEAP 4.2.0.CP04.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 4 serves as a\nreplacement to JBEAP 4.2.0.CP03.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the release notes. The link to the release notes is available\nbelow in the References section.\n\nThe following security issues are also fixed with this release: \n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process. (CVE-2007-5342)\n\nThe property that controls the download of server classes was set to \"true\"\nin the \"production\" configuration. When the class download service is bound\nto an external interface, a remote attacker was able to download arbitrary\nclass files from the server class path. (CVE-2008-3519)\n\nWarning: before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.2 on Red Hat Enterprise Linux 4 are advised to upgrade\nto these updated packages, which resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0833", "url": "https://access.redhat.com/errata/RHSA-2008:0833" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp04/html-single/readme/index.html", "url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp04/html-single/readme/index.html" }, { "category": "external", "summary": "427216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216" }, { "category": "external", "summary": "456973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456973" }, { "category": "external", "summary": "458823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0833.json" } ], "title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0CP04 security update", "tracking": { "current_release_date": "2024-11-22T02:13:22+00:00", "generator": { "date": "2024-11-22T02:13:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0833", "initial_release_date": "2008-09-22T12:50:00+00:00", "revision_history": [ { "date": "2008-09-22T12:50:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-09-22T08:50:41+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:13:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "product": { "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "product": { "name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "product_id": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-beanutils@1.7.0-2jpp.ep1.5.el4?arch=src" } } }, { "category": "product_version", "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "product": { "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el4?arch=src" } } }, { "category": "product_version", "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "product": { "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el4?arch=src" } } }, { "category": "product_version", "name": "javassist-0:3.8.0-1.ep1.el4.src", "product": { "name": "javassist-0:3.8.0-1.ep1.el4.src", "product_id": "javassist-0:3.8.0-1.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/javassist@3.8.0-1.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "product": { "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el4?arch=src" } } }, { "category": "product_version", "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "product": { "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el4?arch=src" } } }, { "category": "product_version", "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "product": { "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el4?arch=src" } } }, { "category": "product_version", "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "product": { "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.1.el4?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src", "product": { "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src", "product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el4?arch=src" } } }, { "category": "product_version", "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "product": { "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el4?arch=src" } } }, { "category": "product_version", "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "product": { "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el4?arch=src" } } }, { "category": "product_version", "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "product": { "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el4?arch=src" } } }, { "category": "product_version", "name": "jboss-seam-0:1.2.1-1.ep1.10.el4.src", "product": { "name": "jboss-seam-0:1.2.1-1.ep1.10.el4.src", "product_id": "jboss-seam-0:1.2.1-1.ep1.10.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.10.el4?arch=src" } } }, { "category": "product_version", "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "product": { "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=src" } } }, { "category": "product_version", "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "product": { "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "product": { "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.1.el4?arch=src" } } }, { "category": "product_version", "name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src", "product": { "name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src", "product_id": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-4.GA_CP04.ep1.5.el4?arch=src" } } }, { "category": "product_version", "name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src", "product": { "name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src", "product_id": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas@4.2.0-3.GA_CP04.ep1.8.el4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "product": { "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "product": { "name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "product_id": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "product": { "name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "product_id": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-beanutils@1.7.0-2jpp.ep1.5.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "product": { "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el4?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "product": { "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el4?arch=noarch" } } }, { "category": "product_version", "name": "javassist-0:3.8.0-1.ep1.el4.noarch", "product": { "name": "javassist-0:3.8.0-1.ep1.el4.noarch", "product_id": "javassist-0:3.8.0-1.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/javassist@3.8.0-1.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "product": { "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "product": { "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el4?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "product": { "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "product": { "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.1.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "product": { "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "product": { "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "product": { "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el4?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "product": { "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch", "product": { "name": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch", "product_id": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.10.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch", "product": { "name": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch", "product_id": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-1.ep1.10.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "product": { "name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "product_id": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "product": { "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "product": { "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "product": { "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "product": { "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.1.el4?arch=noarch" } } }, { "category": "product_version", "name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch", "product": { "name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch", "product_id": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-4.GA_CP04.ep1.5.el4?arch=noarch" } } }, { "category": "product_version", "name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch", "product": { "name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch", "product_id": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.2.0-4.GA_CP04.ep1.5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch", "product": { "name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch", "product_id": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas@4.2.0-3.GA_CP04.ep1.8.el4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch" }, "product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src" }, "product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch" }, "product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src" }, "product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch" }, "product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src" }, "product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch" }, "product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src" }, "product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch" }, "product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch" }, "product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src" }, "product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch" }, "product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src" }, "product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch" }, "product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch" }, "product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch" }, "product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src" }, "product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch" }, "product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src" }, "product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "javassist-0:3.8.0-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch" }, "product_reference": "javassist-0:3.8.0-1.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "javassist-0:3.8.0-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.src" }, "product_reference": "javassist-0:3.8.0-1.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch" }, "product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src" }, "product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch" }, "product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src" }, "product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch" }, "product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src" }, "product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch" }, "product_reference": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-1.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src" }, "product_reference": "jboss-seam-0:1.2.1-1.ep1.10.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch" }, "product_reference": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch" }, "product_reference": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src" }, "product_reference": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch" }, "product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src" }, "product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch" }, "product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src" }, "product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch" }, "product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src" }, "product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch" }, "product_reference": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch" }, "product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src" }, "product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch" }, "product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src" }, "product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch" }, "product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src" }, "product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch" }, "product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src" }, "product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch" }, "product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch" }, "product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src" }, "product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch" }, "product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src" }, "product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch" }, "product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch" }, "product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch" }, "product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src" }, "product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch" }, "product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src" }, "product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "javassist-0:3.8.0-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch" }, "product_reference": "javassist-0:3.8.0-1.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "javassist-0:3.8.0-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.src" }, "product_reference": "javassist-0:3.8.0-1.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch" }, "product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src" }, "product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch" }, "product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src" }, "product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch" }, "product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src" }, "product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch" }, "product_reference": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-1.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src" }, "product_reference": "jboss-seam-0:1.2.1-1.ep1.10.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch" }, "product_reference": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch" }, "product_reference": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src" }, "product_reference": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch" }, "product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src" }, "product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch" }, "product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src" }, "product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch" }, "product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src" }, "product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch" }, "product_reference": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-5342", "discovery_date": "2007-10-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch", "4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.src", "4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src", "4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch", "4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.src", "4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "427216" } ], "notes": [ { "category": "description", "text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.", "title": "Vulnerability description" }, { "category": "summary", "text": "Apache Tomcat\u0027s default security policy is too open", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src", "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch", "4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src", "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src", "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch", "4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src", "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch" ], "known_not_affected": [ "4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch", "4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.src", "4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src", "4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch", "4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.src", "4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5342" }, { "category": "external", "summary": "RHBZ#427216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5342" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342" } ], "release_date": "2007-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-09-22T12:50:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src", "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch", "4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src", "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src", "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch", "4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src", "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0833" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Apache Tomcat\u0027s default security policy is too open" }, { "cve": "CVE-2008-3519", "discovery_date": "2008-04-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch", "4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.src", "4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src", "4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch", "4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.src", "4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "458823" } ], "notes": [ { "category": "description", "text": "The default configuration of the JBossAs component in Red Hat JBoss Enterprise Application Platform (aka JBossEAP or EAP), possibly 4.2 before CP04 and 4.3 before CP02, when a production environment is enabled, sets the DownloadServerClasses property to true, which allows remote attackers to obtain sensitive information (non-EJB classes) via a download request, a different vulnerability than CVE-2008-3273.", "title": "Vulnerability description" }, { "category": "summary", "text": "JBossEAP allows download of non-EJB class files", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src", "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch", "4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src", "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src", "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch", "4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src", "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch" ], "known_not_affected": [ "4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch", "4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.src", "4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src", "4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch", "4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.src", "4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3519" }, { "category": "external", "summary": "RHBZ#458823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3519", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3519" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519" } ], "release_date": "2008-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-09-22T12:50:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src", "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch", "4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src", "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src", "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch", "4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src", "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0833" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JBossEAP allows download of non-EJB class files" } ] }
rhsa-2008_0195
Vulnerability from csaf_redhat
Published
2008-04-28 09:15
Modified
2024-11-22 02:13
Summary
Red Hat Security Advisory: tomcat security update
Notes
Topic
Updated tomcat packages that fix multiple security issues are now available
for Red Hat Developer Suite 3.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
Tomcat is a servlet container for Java Servlet and Java Server Pages
technologies.
Tomcat was found treating single quote characters -- ' -- as delimiters in
cookies. This could allow remote attackers to obtain sensitive information,
such as session IDs, for session hijacking attacks (CVE-2007-3382).
It was reported Tomcat did not properly handle the following character
sequence in a cookie: \" (a backslash followed by a double-quote). It was
possible remote attackers could use this failure to obtain sensitive
information, such as session IDs, for session hijacking attacks
(CVE-2007-3385).
A directory traversal vulnerability existed in the Apache Tomcat webdav
servlet. This allowed remote attackers to remote authenticated users to
read accessible to the local user running the tomcat process (CVE-2007-5461).
The default security policy in the JULI logging component did not restrict
access permissions to files. This could be misused by untrusted web
applications to access and write arbitrary files in the context of the
tomcat process (CVE-2007-5342).
Users of Tomcat should update to these erratum packages, which contain
backported patches and are not vulnerable to these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated tomcat packages that fix multiple security issues are now available\nfor Red Hat Developer Suite 3.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Tomcat is a servlet container for Java Servlet and Java Server Pages\ntechnologies.\n\nTomcat was found treating single quote characters -- \u0027 -- as delimiters in\ncookies. This could allow remote attackers to obtain sensitive information,\nsuch as session IDs, for session hijacking attacks (CVE-2007-3382).\n\nIt was reported Tomcat did not properly handle the following character\nsequence in a cookie: \\\" (a backslash followed by a double-quote). It was\npossible remote attackers could use this failure to obtain sensitive\ninformation, such as session IDs, for session hijacking attacks\n(CVE-2007-3385).\n\nA directory traversal vulnerability existed in the Apache Tomcat webdav\nservlet. This allowed remote attackers to remote authenticated users to\nread accessible to the local user running the tomcat process (CVE-2007-5461).\n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process (CVE-2007-5342).\n\nUsers of Tomcat should update to these erratum packages, which contain\nbackported patches and are not vulnerable to these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0195", "url": "https://access.redhat.com/errata/RHSA-2008:0195" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://tomcat.apache.org/security-5.html", "url": "http://tomcat.apache.org/security-5.html" }, { "category": "external", "summary": "247972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247972" }, { "category": "external", "summary": "247976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247976" }, { "category": "external", "summary": "333791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791" }, { "category": "external", "summary": "427216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0195.json" } ], "title": "Red Hat Security Advisory: tomcat security update", "tracking": { "current_release_date": "2024-11-22T02:13:32+00:00", "generator": { "date": "2024-11-22T02:13:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0195", "initial_release_date": "2008-04-28T09:15:00+00:00", "revision_history": [ { "date": "2008-04-28T09:15:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-04-28T05:16:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:13:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Developer Suite v.3 (AS v.4)", "product": { "name": "Red Hat Developer Suite v.3 (AS v.4)", "product_id": "4AS-DS3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_developer_suite:3" } } } ], "category": "product_family", "name": "Red Hat Developer Suite v.3" }, { "branches": [ { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp_11rh.src", "product": { "name": "tomcat5-0:5.5.23-0jpp_11rh.src", "product_id": "tomcat5-0:5.5.23-0jpp_11rh.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_11rh?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp_11rh.noarch", "product": { "name": "tomcat5-0:5.5.23-0jpp_11rh.noarch", "product_id": "tomcat5-0:5.5.23-0jpp_11rh.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_11rh?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch", "product": { "name": "tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch", "product_id": "tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_11rh?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch", "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_11rh?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch", "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_11rh?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch", "product": { "name": "tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch", "product_id": "tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_11rh?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch", "product": { "name": "tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch", "product_id": "tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_11rh?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)", "product_id": "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch" }, "product_reference": "tomcat5-0:5.5.23-0jpp_11rh.noarch", "relates_to_product_reference": "4AS-DS3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp_11rh.src as a component of Red Hat Developer Suite v.3 (AS v.4)", "product_id": "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src" }, "product_reference": "tomcat5-0:5.5.23-0jpp_11rh.src", "relates_to_product_reference": "4AS-DS3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)", "product_id": "4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch", "relates_to_product_reference": "4AS-DS3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)", "product_id": "4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch", "relates_to_product_reference": "4AS-DS3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)", "product_id": "4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch", "relates_to_product_reference": "4AS-DS3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)", "product_id": "4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch", "relates_to_product_reference": "4AS-DS3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)", "product_id": "4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch", "relates_to_product_reference": "4AS-DS3" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-3382", "discovery_date": "2007-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "247972" } ], "notes": [ { "category": "description", "text": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (\"\u0027\") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat handling of cookies", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src", "4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-3382" }, { "category": "external", "summary": "RHBZ#247972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247972" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-3382", "url": "https://www.cve.org/CVERecord?id=CVE-2007-3382" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3382", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3382" } ], "release_date": "2007-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-04-28T09:15:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src", "4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0195" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat handling of cookies" }, { "cve": "CVE-2007-3385", "discovery_date": "2007-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "247976" } ], "notes": [ { "category": "description", "text": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \\\" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat handling of cookie values", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src", "4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-3385" }, { "category": "external", "summary": "RHBZ#247976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247976" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-3385", "url": "https://www.cve.org/CVERecord?id=CVE-2007-3385" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3385", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3385" } ], "release_date": "2007-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-04-28T09:15:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src", "4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0195" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat handling of cookie values" }, { "cve": "CVE-2007-5342", "discovery_date": "2007-10-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "427216" } ], "notes": [ { "category": "description", "text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.", "title": "Vulnerability description" }, { "category": "summary", "text": "Apache Tomcat\u0027s default security policy is too open", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src", "4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5342" }, { "category": "external", "summary": "RHBZ#427216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5342" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342" } ], "release_date": "2007-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-04-28T09:15:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src", "4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0195" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Apache Tomcat\u0027s default security policy is too open" }, { "cve": "CVE-2007-5461", "discovery_date": "2007-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "333791" } ], "notes": [ { "category": "description", "text": "Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.", "title": "Vulnerability description" }, { "category": "summary", "text": "Absolute path traversal Apache Tomcat WEBDAV", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src", "4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5461" }, { "category": "external", "summary": "RHBZ#333791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5461", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5461" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461" } ], "release_date": "2007-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-04-28T09:15:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src", "4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch", "4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0195" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Absolute path traversal Apache Tomcat WEBDAV" } ] }
rhsa-2008_0834
Vulnerability from csaf_redhat
Published
2008-09-22 13:15
Modified
2024-11-22 02:13
Summary
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0CP04 security update
Notes
Topic
Updated JBoss Enterprise Application Platform (JBEAP) 4.2 packages that fix
various security issues are now available for Red Hat Enterprise Linux 5 as
JBEAP 4.2.0.CP04.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Details
JBoss Enterprise Application Platform is the market leading platform for
innovative and scalable Java applications; integrating the JBoss
Application Server, with JBoss Hibernate and JBoss Seam into a complete,
simple enterprise solution.
This release of JBEAP for Red Hat Enterprise Linux 5 serves as a
replacement to JBEAP 4.2.0.CP03.
These updated packages include bug fixes and enhancements which are
detailed in the release notes. The link to the release notes is available
below in the References section.
The following security issues are also fixed with this release:
The default security policy in the JULI logging component did not restrict
access permissions to files. This could be misused by untrusted web
applications to access and write arbitrary files in the context of the
tomcat process. (CVE-2007-5342)
The property that controls the download of server classes was set to "true"
in the "production" configuration. When the class download service is bound
to an external interface, a remote attacker was able to download arbitrary
class files from the server class path. (CVE-2008-3519)
Warning: before applying this update, please backup the JBEAP
"server/[configuration]/deploy/" directory, and any other customized
configuration files.
All users of JBEAP 4.2 on Red Hat Enterprise Linux 5 are advised to upgrade
to these updated packages, which resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.2 packages that fix\nvarious security issues are now available for Red Hat Enterprise Linux 5 as\nJBEAP 4.2.0.CP04.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 5 serves as a\nreplacement to JBEAP 4.2.0.CP03.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the release notes. The link to the release notes is available\nbelow in the References section.\n\nThe following security issues are also fixed with this release: \n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process. (CVE-2007-5342)\n\nThe property that controls the download of server classes was set to \"true\"\nin the \"production\" configuration. When the class download service is bound\nto an external interface, a remote attacker was able to download arbitrary\nclass files from the server class path. (CVE-2008-3519)\n \nWarning: before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.2 on Red Hat Enterprise Linux 5 are advised to upgrade\nto these updated packages, which resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0834", "url": "https://access.redhat.com/errata/RHSA-2008:0834" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp04/html-single/readme/index.html", "url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp04/html-single/readme/index.html" }, { "category": "external", "summary": "427216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216" }, { "category": "external", "summary": "458711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458711" }, { "category": "external", "summary": "458823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0834.json" } ], "title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0CP04 security update", "tracking": { "current_release_date": "2024-11-22T02:13:26+00:00", "generator": { "date": "2024-11-22T02:13:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0834", "initial_release_date": "2008-09-22T13:15:00+00:00", "revision_history": [ { "date": "2008-09-22T13:15:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-09-22T09:15:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:13:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src", "product": { "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src", "product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src", "product": { "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src", "product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el5?arch=src" } } }, { "category": "product_version", "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src", "product": { "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src", "product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.2.el5?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src", "product": { "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src", "product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el5.1?arch=src" } } }, { "category": "product_version", "name": "javassist-0:3.8.0-1jpp.ep1.2.el5.src", "product": { "name": "javassist-0:3.8.0-1jpp.ep1.2.el5.src", "product_id": "javassist-0:3.8.0-1jpp.ep1.2.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/javassist@3.8.0-1jpp.ep1.2.el5?arch=src" } } }, { "category": "product_version", "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src", "product": { "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src", "product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el5.1?arch=src" } } }, { "category": "product_version", "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src", "product": { "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src", "product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el5?arch=src" } } }, { "category": "product_version", "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src", "product": { "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src", "product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src", "product": { "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src", "product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el5?arch=src" } } }, { "category": "product_version", "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src", "product": { "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src", "product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el5?arch=src" } } }, { "category": "product_version", "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src", "product": { "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src", "product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el5?arch=src" } } }, { "category": "product_version", "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src", "product": { "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src", "product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1?arch=src" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src", "product": { "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src", "product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el5?arch=src" } } }, { "category": "product_version", "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src", "product": { "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src", "product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el5?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jboss-seam-0:1.2.1-1.ep1.9.el5.src", "product": { "name": "jboss-seam-0:1.2.1-1.ep1.9.el5.src", "product_id": "jboss-seam-0:1.2.1-1.ep1.9.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.9.el5?arch=src" } } }, { "category": "product_version", "name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src", "product": { "name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src", "product_id": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-4.GA_CP04.ep1.3.el5?arch=src" } } }, { "category": "product_version", "name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src", "product": { "name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src", "product_id": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas@4.2.0-4.GA_CP04.ep1.7.el5.6?arch=src" } } }, { "category": "product_version", "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src", "product": { "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src", "product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.2.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch", "product": { "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch", "product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch", "product": { "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch", "product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch", "product": { "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch", "product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.2.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch", "product": { "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch", "product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el5.1?arch=noarch" } } }, { "category": "product_version", "name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch", "product": { "name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch", "product_id": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/javassist@3.8.0-1jpp.ep1.2.el5?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch", "product": { "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch", "product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el5.1?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch", "product": { "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch", "product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el5?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch", "product": { "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch", "product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch", "product": { "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch", "product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "product": { "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "product": { "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "product": { "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "product": { "name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "product_id": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "product": { "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "product": { "name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "product_id": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.2.1-2.GA_CP03.1jpp.ep1.9.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "product": { "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP04.0jpp.ep1.3.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "product": { "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch", "product": { "name": "jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch", "product_id": "jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-1.ep1.9.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-seam-0:1.2.1-1.ep1.9.el5.noarch", "product": { "name": "jboss-seam-0:1.2.1-1.ep1.9.el5.noarch", "product_id": "jboss-seam-0:1.2.1-1.ep1.9.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.9.el5?arch=noarch" } } }, { "category": "product_version", "name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch", "product": { "name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch", "product_id": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.2.0-4.GA_CP04.ep1.3.el5?arch=noarch" } } }, { "category": "product_version", "name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch", "product": { "name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch", "product_id": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-4.GA_CP04.ep1.3.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch", "product": { "name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch", "product_id": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas@4.2.0-4.GA_CP04.ep1.7.el5.6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch", "product": { "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch", "product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.2.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch" }, "product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src" }, "product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch" }, "product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src" }, "product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch" }, "product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src" }, "product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch" }, "product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src" }, "product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch" }, "product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch" }, "product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src" }, "product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch" }, "product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src" }, "product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch" }, "product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch" }, "product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch" }, "product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src" }, "product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch" }, "product_reference": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "javassist-0:3.8.0-1jpp.ep1.2.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.src" }, "product_reference": "javassist-0:3.8.0-1jpp.ep1.2.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch" }, "product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src" }, "product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch" }, "product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src" }, "product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch" }, "product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src" }, "product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-1.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.noarch" }, "product_reference": "jboss-seam-0:1.2.1-1.ep1.9.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-1.ep1.9.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.src" }, "product_reference": "jboss-seam-0:1.2.1-1.ep1.9.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch" }, "product_reference": "jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch" }, "product_reference": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src" }, "product_reference": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch" }, "product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src" }, "product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch" }, "product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src" }, "product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch" }, "product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src" }, "product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch" }, "product_reference": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-5342", "discovery_date": "2007-10-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch", "5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src", "5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src", "5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src", "5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch", "5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src", "5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "427216" } ], "notes": [ { "category": "description", "text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.", "title": "Vulnerability description" }, { "category": "summary", "text": "Apache Tomcat\u0027s default security policy is too open", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.noarch", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch" ], "known_not_affected": [ "5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch", "5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src", "5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src", "5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src", "5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch", "5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src", "5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5342" }, { "category": "external", "summary": "RHBZ#427216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5342" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342" } ], "release_date": "2007-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-09-22T13:15:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.noarch", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0834" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Apache Tomcat\u0027s default security policy is too open" }, { "cve": "CVE-2008-3519", "discovery_date": "2008-04-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch", "5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src", "5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src", "5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src", "5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch", "5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src", "5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "458823" } ], "notes": [ { "category": "description", "text": "The default configuration of the JBossAs component in Red Hat JBoss Enterprise Application Platform (aka JBossEAP or EAP), possibly 4.2 before CP04 and 4.3 before CP02, when a production environment is enabled, sets the DownloadServerClasses property to true, which allows remote attackers to obtain sensitive information (non-EJB classes) via a download request, a different vulnerability than CVE-2008-3273.", "title": "Vulnerability description" }, { "category": "summary", "text": "JBossEAP allows download of non-EJB class files", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.noarch", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch" ], "known_not_affected": [ "5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch", "5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src", "5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src", "5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src", "5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch", "5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src", "5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3519" }, { "category": "external", "summary": "RHBZ#458823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3519", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3519" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519" } ], "release_date": "2008-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-09-22T13:15:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.noarch", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0834" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JBossEAP allows download of non-EJB class files" } ] }
rhsa-2008_0831
Vulnerability from csaf_redhat
Published
2008-09-22 13:02
Modified
2024-11-22 02:14
Summary
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0CP02 security update
Notes
Topic
Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix
various security issues are now available for Red Hat Enterprise Linux 4 as
JBEAP 4.3.0.CP02.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Details
JBoss Enterprise Application Platform is the market leading platform for
innovative and scalable Java applications; integrating the JBoss
Application Server, with JBoss Hibernate and JBoss Seam into a complete,
simple enterprise solution.
This release of JBEAP for Red Hat Enterprise Linux 4 serves as a
replacement to JBEAP 4.3.0.CP01.
These updated packages include bug fixes and enhancements which are
detailed in the release notes. The link to the release notes is available
below in the References section.
The following security issues are also fixed with this release:
The default security policy in the JULI logging component did not restrict
access permissions to files. This could be misused by untrusted web
applications to access and write arbitrary files in the context of the
tomcat process. (CVE-2007-5342)
The property that controls the download of server classes was set to "true"
in the "production" configuration. When the class download service is bound
to an external interface, a remote attacker was able to download arbitrary
class files from the server class path. (CVE-2008-3519)
Warning: before applying this update, please backup the JBEAP
"server/[configuration]/deploy/" directory, and any other customized
configuration files.
All users of JBEAP 4.3 on Red Hat Enterprise Linux 4 are advised to upgrade
to these updated packages, which resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix\nvarious security issues are now available for Red Hat Enterprise Linux 4 as\nJBEAP 4.3.0.CP02.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 4 serves as a\nreplacement to JBEAP 4.3.0.CP01.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the release notes. The link to the release notes is available\nbelow in the References section.\n\nThe following security issues are also fixed with this release: \n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process. (CVE-2007-5342)\n\nThe property that controls the download of server classes was set to \"true\"\nin the \"production\" configuration. When the class download service is bound\nto an external interface, a remote attacker was able to download arbitrary\nclass files from the server class path. (CVE-2008-3519)\n\nWarning: before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.3 on Red Hat Enterprise Linux 4 are advised to upgrade\nto these updated packages, which resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0831", "url": "https://access.redhat.com/errata/RHSA-2008:0831" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.3.0.cp02/html-single/readme/index.html", "url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.3.0.cp02/html-single/readme/index.html" }, { "category": "external", "summary": "427216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216" }, { "category": "external", "summary": "456975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456975" }, { "category": "external", "summary": "458823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0831.json" } ], "title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0CP02 security update", "tracking": { "current_release_date": "2024-11-22T02:14:03+00:00", "generator": { "date": "2024-11-22T02:14:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0831", "initial_release_date": "2008-09-22T13:02:00+00:00", "revision_history": [ { "date": "2008-09-22T13:02:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-09-22T09:02:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:14:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "product": { "name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "product_id": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-beanutils@1.7.0-2jpp.ep1.5.el4?arch=src" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "product": { "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=src" } } }, { "category": "product_version", "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "product": { "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el4?arch=src" } } }, { "category": "product_version", "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "product": { "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el4?arch=src" } } }, { "category": "product_version", "name": "javassist-0:3.8.0-1.ep1.el4.src", "product": { "name": "javassist-0:3.8.0-1.ep1.el4.src", "product_id": "javassist-0:3.8.0-1.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/javassist@3.8.0-1.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "product": { "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el4?arch=src" } } }, { "category": "product_version", "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "product": { "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el4?arch=src" } } }, { "category": "product_version", "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "product": { "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el4?arch=src" } } }, { "category": "product_version", "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "product": { "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.1.el4?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src", "product": { "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src", "product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el4?arch=src" } } }, { "category": "product_version", "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "product": { "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el4?arch=src" } } }, { "category": "product_version", "name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src", "product": { "name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src", "product_id": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws-common@1.0.0-1.GA_CP01.0jpp.ep1.3.el4?arch=src" } } }, { "category": "product_version", "name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src", "product": { "name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src", "product_id": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-0jpp.ep1.11.el4?arch=src" } } }, { "category": "product_version", "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "product": { "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el4?arch=src" } } }, { "category": "product_version", "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "product": { "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el4?arch=src" } } }, { "category": "product_version", "name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src", "product": { "name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src", "product_id": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jaxws@2.1.1-1jpp.ep1.3.el4?arch=src" } } }, { "category": "product_version", "name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src", "product": { "name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src", "product_id": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1jpp.ep1.2.el4?arch=src" } } }, { "category": "product_version", "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src", "product": { "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src", "product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4?arch=src" } } }, { "category": "product_version", "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "product": { "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "product": { "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=src" } } }, { "category": "product_version", "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "product": { "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.1.el4?arch=src" } } }, { "category": "product_version", "name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src", "product": { "name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src", "product_id": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-1.SP3_CP03.0jpp.ep1.3.el4?arch=src" } } }, { "category": "product_version", "name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src", "product": { "name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src", "product_id": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws@2.0.1-2.SP2_CP03.0jpp.ep1.1.el4?arch=src" } } }, { "category": "product_version", "name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src", "product": { "name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src", "product_id": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas@4.3.0-2.GA_CP02.ep1.10.el4?arch=src" } } }, { "category": "product_version", "name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src", "product": { "name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src", "product_id": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-3.GA_CP02.ep1.9.el4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "product": { "name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "product_id": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-beanutils@1.7.0-2jpp.ep1.5.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "product": { "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "product": { "name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "product_id": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "product": { "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el4?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "product": { "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el4?arch=noarch" } } }, { "category": "product_version", "name": "javassist-0:3.8.0-1.ep1.el4.noarch", "product": { "name": "javassist-0:3.8.0-1.ep1.el4.noarch", "product_id": "javassist-0:3.8.0-1.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/javassist@3.8.0-1.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "product": { "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "product": { "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el4?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "product": { "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "product": { "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.1.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "product": { "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "product": { "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch", "product": { "name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch", "product_id": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws-common@1.0.0-1.GA_CP01.0jpp.ep1.3.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch", "product": { "name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch", "product_id": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-0jpp.ep1.11.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "product": { "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el4?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "product": { "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el4?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch", "product": { "name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch", "product_id": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jaxws@2.1.1-1jpp.ep1.3.el4?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch", "product": { "name": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch", "product_id": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jaxb-javadoc@2.1.4-1jpp.ep1.2.el4?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch", "product": { "name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch", "product_id": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1jpp.ep1.2.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "product": { "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "product": { "name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "product_id": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "product": { "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "product": { "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "product": { "name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "product_id": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "product": { "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "product": { "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch", "product": { "name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch", "product_id": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-1.SP3_CP03.0jpp.ep1.3.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch", "product": { "name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch", "product_id": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws@2.0.1-2.SP2_CP03.0jpp.ep1.1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch", "product": { "name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch", "product_id": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas@4.3.0-2.GA_CP02.ep1.10.el4?arch=noarch" } } }, { "category": "product_version", "name": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch", "product": { "name": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch", "product_id": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.3.0-3.GA_CP02.ep1.9.el4?arch=noarch" } } }, { "category": "product_version", "name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch", "product": { "name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch", "product_id": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-3.GA_CP02.ep1.9.el4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch" }, "product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src" }, "product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch" }, "product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src" }, "product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch" }, "product_reference": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src" }, "product_reference": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch" }, "product_reference": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch" }, "product_reference": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src" }, "product_reference": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch" }, "product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src" }, "product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch" }, "product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src" }, "product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch" }, "product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch" }, "product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src" }, "product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch" }, "product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src" }, "product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch" }, "product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch" }, "product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch" }, "product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src" }, "product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch" }, "product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src" }, "product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "javassist-0:3.8.0-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch" }, "product_reference": "javassist-0:3.8.0-1.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "javassist-0:3.8.0-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src" }, "product_reference": "javassist-0:3.8.0-1.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch" }, "product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src" }, "product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch" }, "product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src" }, "product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch" }, "product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src" }, "product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch" }, "product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src" }, "product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch" }, "product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src" }, "product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch" }, "product_reference": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch" }, "product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src" }, "product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch" }, "product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src" }, "product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch" }, "product_reference": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src" }, "product_reference": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch" }, "product_reference": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src" }, "product_reference": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch" }, "product_reference": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src" }, "product_reference": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch" }, "product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src" }, "product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch" }, "product_reference": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src" }, "product_reference": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch" }, "product_reference": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch" }, "product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src" }, "product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch" }, "product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src" }, "product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch" }, "product_reference": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src" }, "product_reference": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch" }, "product_reference": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch" }, "product_reference": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src" }, "product_reference": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch" }, "product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src" }, "product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch" }, "product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src" }, "product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch" }, "product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch" }, "product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src" }, "product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch" }, "product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src" }, "product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch" }, "product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch" }, "product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch" }, "product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src" }, "product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch" }, "product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src" }, "product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "javassist-0:3.8.0-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch" }, "product_reference": "javassist-0:3.8.0-1.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "javassist-0:3.8.0-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src" }, "product_reference": "javassist-0:3.8.0-1.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch" }, "product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src" }, "product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch" }, "product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src" }, "product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch" }, "product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src" }, "product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch" }, "product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src" }, "product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch" }, "product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src" }, "product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch" }, "product_reference": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch" }, "product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src" }, "product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch" }, "product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src" }, "product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch" }, "product_reference": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src" }, "product_reference": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch" }, "product_reference": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src" }, "product_reference": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch" }, "product_reference": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src" }, "product_reference": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch" }, "product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src" }, "product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch" }, "product_reference": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src" }, "product_reference": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch" }, "product_reference": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-5342", "discovery_date": "2007-10-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "427216" } ], "notes": [ { "category": "description", "text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.", "title": "Vulnerability description" }, { "category": "summary", "text": "Apache Tomcat\u0027s default security policy is too open", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch" ], "known_not_affected": [ "4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5342" }, { "category": "external", "summary": "RHBZ#427216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5342" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342" } ], "release_date": "2007-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-09-22T13:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0831" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Apache Tomcat\u0027s default security policy is too open" }, { "cve": "CVE-2008-3519", "discovery_date": "2008-04-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "458823" } ], "notes": [ { "category": "description", "text": "The default configuration of the JBossAs component in Red Hat JBoss Enterprise Application Platform (aka JBossEAP or EAP), possibly 4.2 before CP04 and 4.3 before CP02, when a production environment is enabled, sets the DownloadServerClasses property to true, which allows remote attackers to obtain sensitive information (non-EJB classes) via a download request, a different vulnerability than CVE-2008-3273.", "title": "Vulnerability description" }, { "category": "summary", "text": "JBossEAP allows download of non-EJB class files", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch" ], "known_not_affected": [ "4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src", "4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src", "4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src", "4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch", "4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src", "4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3519" }, { "category": "external", "summary": "RHBZ#458823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3519", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3519" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519" } ], "release_date": "2008-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-09-22T13:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0831" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JBossEAP allows download of non-EJB class files" } ] }
rhsa-2008_0042
Vulnerability from csaf_redhat
Published
2008-03-11 10:51
Modified
2024-11-22 02:13
Summary
Red Hat Security Advisory: tomcat security update
Notes
Topic
Updated tomcat packages that fix security issues and bugs are now available
for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
Tomcat is a servlet container for Java Servlet and JavaServer Pages
technologies.
A directory traversal vulnerability existed in the Apache Tomcat webdav
servlet. In some configurations it allowed remote authenticated users to
read files accessible to the local tomcat process. (CVE-2007-5461)
The default security policy in the JULI logging component did not restrict
access permissions to files. This could be misused by untrusted web
applications to access and write arbitrary files in the context of the
tomcat process. (CVE-2007-5342)
Users of Tomcat should update to these errata packages, which contain
backported patches and are not vulnerable to these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated tomcat packages that fix security issues and bugs are now available\nfor Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Tomcat is a servlet container for Java Servlet and JavaServer Pages\ntechnologies.\n\nA directory traversal vulnerability existed in the Apache Tomcat webdav\nservlet. In some configurations it allowed remote authenticated users to\nread files accessible to the local tomcat process. (CVE-2007-5461)\n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process. (CVE-2007-5342)\n\nUsers of Tomcat should update to these errata packages, which contain\nbackported patches and are not vulnerable to these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0042", "url": "https://access.redhat.com/errata/RHSA-2008:0042" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#moderate", "url": "http://www.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "333791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791" }, { "category": "external", "summary": "427216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0042.json" } ], "title": "Red Hat Security Advisory: tomcat security update", "tracking": { "current_release_date": "2024-11-22T02:13:18+00:00", "generator": { "date": "2024-11-22T02:13:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0042", "initial_release_date": "2008-03-11T10:51:00+00:00", "revision_history": [ { "date": "2008-03-11T10:51:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-03-11T06:51:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:13:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product": { "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product": { "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product": { "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.3.el5_1?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.3.el5_1?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product": { "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.3.el5_1?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.3.el5_1?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.3.el5_1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src", "product": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src", "product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product": { "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.3.el5_1?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.3.el5_1?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product": { "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.3.el5_1?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.3.el5_1?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.3.el5_1?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product": { "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.3.el5_1?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.3.el5_1?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product": { "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.3.el5_1?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.3.el5_1?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.3.el5_1?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "product": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=ppc64" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "product": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product": { "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.3.el5_1?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.3.el5_1?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product": { "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.3.el5_1?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.3.el5_1?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.3.el5_1?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64" }, "product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src" }, "product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64" }, "product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src" }, "product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64" }, "product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src" }, "product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-5342", "discovery_date": "2007-10-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "427216" } ], "notes": [ { "category": "description", "text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.", "title": "Vulnerability description" }, { "category": "summary", "text": "Apache Tomcat\u0027s default security policy is too open", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5342" }, { "category": "external", "summary": "RHBZ#427216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5342" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342" } ], "release_date": "2007-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-03-11T10:51:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0042" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Apache Tomcat\u0027s default security policy is too open" }, { "cve": "CVE-2007-5461", "discovery_date": "2007-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "333791" } ], "notes": [ { "category": "description", "text": "Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.", "title": "Vulnerability description" }, { "category": "summary", "text": "Absolute path traversal Apache Tomcat WEBDAV", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5461" }, { "category": "external", "summary": "RHBZ#333791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5461", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5461" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461" } ], "release_date": "2007-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-03-11T10:51:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src", "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src", "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src", "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64", "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386", "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64", "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc", "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x", "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0042" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Absolute path traversal Apache Tomcat WEBDAV" } ] }
rhsa-2008_0832
Vulnerability from csaf_redhat
Published
2008-09-22 13:27
Modified
2024-11-22 02:13
Summary
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0CP02 security update
Notes
Topic
Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix
various security issues are now available for Red Hat Enterprise Linux 5 as
JBEAP 4.3.0.CP02.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Details
JBoss Enterprise Application Platform is the market leading platform for
innovative and scalable Java applications; integrating the JBoss
Application Server, with JBoss Hibernate and JBoss Seam into a complete,
simple enterprise solution.
This release of JBEAP for Red Hat Enterprise Linux 5 serves as a
replacement to JBEAP 4.3.0.CP01.
These updated packages include bug fixes and enhancements which are
detailed in the release notes. The link to the release notes is available
below in the References section.
The following security issues are also fixed with this release:
The default security policy in the JULI logging component did not restrict
access permissions to files. This could be misused by untrusted web
applications to access and write arbitrary files in the context of the
tomcat process. (CVE-2007-5342)
The property that controls the download of server classes was set to "true"
in the "production" configuration. When the class download service is bound
to an external interface, a remote attacker was able to download arbitrary
class files from the server class path. (CVE-2008-3519)
Warning: before applying this update, please backup the JBEAP
"server/[configuration]/deploy/" directory, and any other customized
configuration files.
All users of JBEAP 4.3 on Red Hat Enterprise Linux 5 are advised to upgrade
to these updated packages, which resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix\nvarious security issues are now available for Red Hat Enterprise Linux 5 as\nJBEAP 4.3.0.CP02.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 5 serves as a\nreplacement to JBEAP 4.3.0.CP01.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the release notes. The link to the release notes is available\nbelow in the References section.\n\nThe following security issues are also fixed with this release: \n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process. (CVE-2007-5342)\n\nThe property that controls the download of server classes was set to \"true\"\nin the \"production\" configuration. When the class download service is bound\nto an external interface, a remote attacker was able to download arbitrary\nclass files from the server class path. (CVE-2008-3519)\n\nWarning: before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.3 on Red Hat Enterprise Linux 5 are advised to upgrade\nto these updated packages, which resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0832", "url": "https://access.redhat.com/errata/RHSA-2008:0832" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.3.0.cp02/html-single/readme/index.html", "url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.3.0.cp02/html-single/readme/index.html" }, { "category": "external", "summary": "427216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216" }, { "category": "external", "summary": "458713", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458713" }, { "category": "external", "summary": "458823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0832.json" } ], "title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0CP02 security update", "tracking": { "current_release_date": "2024-11-22T02:13:18+00:00", "generator": { "date": "2024-11-22T02:13:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0832", "initial_release_date": "2008-09-22T13:27:00+00:00", "revision_history": [ { "date": "2008-09-22T13:27:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-09-22T09:27:27+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:13:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch", "product": { "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch", "product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch", "product": { "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch", "product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch", "product": { "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch", "product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.2.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch", "product": { "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch", "product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el5.1?arch=noarch" } } }, { "category": "product_version", "name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch", "product": { "name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch", "product_id": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/javassist@3.8.0-1jpp.ep1.2.el5?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch", "product": { "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch", "product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el5.1?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch", "product": { "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch", "product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el5?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch", "product": { "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch", "product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch", "product": { "name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch", "product_id": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-1.SP3_CP03.0jpp.ep1.3.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch", "product": { "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch", "product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch", "product": { "name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch", "product_id": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws-common@1.0.0-1.GA_CP01.0jpp.ep1.3.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "product": { "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "product": { "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "product": { "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "product": { "name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "product_id": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1?arch=noarch" } } }, { "category": "product_version", "name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch", "product": { "name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch", "product_id": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-0jpp.ep1.11.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "product": { "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "product": { "name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "product_id": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.2.1-2.GA_CP03.1jpp.ep1.9.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "product": { "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP04.0jpp.ep1.3.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "product": { "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch", "product": { "name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch", "product_id": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jaxws@2.1.1-1jpp.ep1.3.el5?arch=noarch" } } }, { "category": "product_version", "name": "rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch", "product": { "name": "rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch", "product_id": "rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-2.GA_CP02.ep1.6.el5?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch", "product": { "name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch", "product_id": "glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1jpp.ep1.4.el5.2?arch=noarch" } } }, { "category": "product_version", "name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch", "product": { "name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch", "product_id": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws@2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch", "product": { "name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch", "product_id": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas@4.3.0-2.GA_CP02.ep1.10.el5.2?arch=noarch" } } }, { "category": "product_version", "name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch", "product": { "name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch", "product_id": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1?arch=noarch" } } }, { "category": "product_version", "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch", "product": { "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch", "product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1?arch=noarch" } } }, { "category": "product_version", "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch", "product": { "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch", "product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.2.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src", "product": { "name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src", "product_id": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-1.SP3_CP03.0jpp.ep1.3.el5?arch=src" } } }, { "category": "product_version", "name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src", "product": { "name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src", "product_id": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas@4.3.0-2.GA_CP02.ep1.10.el5.2?arch=src" } } }, { "category": "product_version", "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src", "product": { "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src", "product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch" }, "product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch" }, "product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch" }, "product_reference": "glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch" }, "product_reference": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch" }, "product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch" }, "product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch" }, "product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch" }, "product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch" }, "product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch" }, "product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch" }, "product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch" }, "product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch" }, "product_reference": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch" }, "product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch" }, "product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch" }, "product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src" }, "product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch" }, "product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch" }, "product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src" }, "product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch" }, "product_reference": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch" }, "product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src" }, "product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch" }, "product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch" }, "product_reference": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch" }, "product_reference": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch" }, "product_reference": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch" }, "product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch" }, "product_reference": "rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-5342", "discovery_date": "2007-10-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "427216" } ], "notes": [ { "category": "description", "text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.", "title": "Vulnerability description" }, { "category": "summary", "text": "Apache Tomcat\u0027s default security policy is too open", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Server-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "5Server-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src", "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch", "5Server-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5342" }, { "category": "external", "summary": "RHBZ#427216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5342" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342" } ], "release_date": "2007-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-09-22T13:27:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Server-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "5Server-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src", "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch", "5Server-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0832" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Apache Tomcat\u0027s default security policy is too open" }, { "cve": "CVE-2008-3519", "discovery_date": "2008-04-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "458823" } ], "notes": [ { "category": "description", "text": "The default configuration of the JBossAs component in Red Hat JBoss Enterprise Application Platform (aka JBossEAP or EAP), possibly 4.2 before CP04 and 4.3 before CP02, when a production environment is enabled, sets the DownloadServerClasses property to true, which allows remote attackers to obtain sensitive information (non-EJB classes) via a download request, a different vulnerability than CVE-2008-3273.", "title": "Vulnerability description" }, { "category": "summary", "text": "JBossEAP allows download of non-EJB class files", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Server-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "5Server-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src", "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch", "5Server-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3519" }, { "category": "external", "summary": "RHBZ#458823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3519", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3519" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519" } ], "release_date": "2008-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-09-22T13:27:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Server-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch", "5Server-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src", "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch", "5Server-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0832" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JBossEAP allows download of non-EJB class files" } ] }
ghsa-w65j-cmqc-37p2
Vulnerability from github
Published
2022-05-01 18:32
Modified
2023-09-22 21:54
Summary
JULI logging component in Apache Tomcat does not restrict certain permissions for web applications
Details
The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler
handler.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-juli" }, "ranges": [ { "events": [ { "introduced": "5.5.9" }, { "last_affected": "5.5.25" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-juli" }, "ranges": [ { "events": [ { "introduced": "6.0.0" }, { "last_affected": "6.0.15" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2007-5342" ], "database_specific": { "cwe_ids": [ "CWE-284" ], "github_reviewed": true, "github_reviewed_at": "2023-09-22T21:54:06Z", "nvd_published_at": "2007-12-27T22:46:00Z", "severity": "MODERATE" }, "details": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the `org.apache.juli.FileHandler` handler.", "id": "GHSA-w65j-cmqc-37p2", "modified": "2023-09-22T21:54:06Z", "published": "2022-05-01T18:32:22Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39201" }, { "type": "PACKAGE", "url": "https://github.com/apache/tomcat/tree/main/java/org/apache/juli" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200804-10.xml" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/3485" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT3216" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm" }, { "type": "WEB", "url": "http://svn.apache.org/viewvc?view=rev\u0026revision=606594" }, { "type": "WEB", "url": "http://tomcat.apache.org/security-5.html" }, { "type": "WEB", "url": "http://tomcat.apache.org/security-6.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2008/dsa-1447" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0042.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0831.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0832.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0833.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0834.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0862.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/485481/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/27006" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/31681" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" } ], "schema_version": "1.4.0", "severity": [], "summary": "JULI logging component in Apache Tomcat does not restrict certain permissions for web applications" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.