Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2007-5342 (GCVE-0-2007-5342)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:24:42.402Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "30676",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30676"
},
{
"name": "RHSA-2008:0862",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0862.html"
},
{
"name": "28915",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28915"
},
{
"name": "ADV-2008-2823",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2823"
},
{
"name": "oval:org.mitre.oval:def:10417",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417"
},
{
"name": "37460",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37460"
},
{
"name": "29313",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29313"
},
{
"name": "31681",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/31681"
},
{
"name": "32120",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32120"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "RHSA-2008:0042",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0042.html"
},
{
"name": "28274",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28274"
},
{
"name": "MDVSA-2008:188",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188"
},
{
"name": "28317",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28317"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm"
},
{
"name": "3485",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3485"
},
{
"name": "20071223 [CVE-2007-5342] Apache Tomcat\u0027s default security policy is too open",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/485481/100/0/threaded"
},
{
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "SUSE-SR:2009:004",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "RHSA-2008:0832",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0832.html"
},
{
"name": "57126",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/57126"
},
{
"name": "32222",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32222"
},
{
"name": "RHSA-2008:0195",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html"
},
{
"name": "FEDORA-2008-1467",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html"
},
{
"name": "GLSA-200804-10",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200804-10.xml"
},
{
"name": "apache-juli-logging-weak-security(39201)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39201"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://svn.apache.org/viewvc?view=rev\u0026revision=606594"
},
{
"name": "RHSA-2008:0833",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0833.html"
},
{
"name": "FEDORA-2008-1603",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html"
},
{
"name": "ADV-2008-1856",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1856/references"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://tomcat.apache.org/security-5.html"
},
{
"name": "39833",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/39833"
},
{
"name": "ADV-2008-0013",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0013"
},
{
"name": "ADV-2008-2780",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2780"
},
{
"name": "RHSA-2008:0831",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0831.html"
},
{
"name": "27006",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/27006"
},
{
"name": "RHSA-2008:0834",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0834.html"
},
{
"name": "DSA-1447",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1447"
},
{
"name": "HPSBST02955",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2"
},
{
"name": "APPLE-SA-2008-10-09",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT3216"
},
{
"name": "29711",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29711"
},
{
"name": "ADV-2009-3316",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"name": "32266",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32266"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-12-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-02-13T16:08:47",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "30676",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30676"
},
{
"name": "RHSA-2008:0862",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0862.html"
},
{
"name": "28915",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28915"
},
{
"name": "ADV-2008-2823",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2823"
},
{
"name": "oval:org.mitre.oval:def:10417",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417"
},
{
"name": "37460",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37460"
},
{
"name": "29313",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29313"
},
{
"name": "31681",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/31681"
},
{
"name": "32120",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32120"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "RHSA-2008:0042",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0042.html"
},
{
"name": "28274",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28274"
},
{
"name": "MDVSA-2008:188",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188"
},
{
"name": "28317",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28317"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm"
},
{
"name": "3485",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3485"
},
{
"name": "20071223 [CVE-2007-5342] Apache Tomcat\u0027s default security policy is too open",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/485481/100/0/threaded"
},
{
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "SUSE-SR:2009:004",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "RHSA-2008:0832",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0832.html"
},
{
"name": "57126",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/57126"
},
{
"name": "32222",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32222"
},
{
"name": "RHSA-2008:0195",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html"
},
{
"name": "FEDORA-2008-1467",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html"
},
{
"name": "GLSA-200804-10",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200804-10.xml"
},
{
"name": "apache-juli-logging-weak-security(39201)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39201"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://svn.apache.org/viewvc?view=rev\u0026revision=606594"
},
{
"name": "RHSA-2008:0833",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0833.html"
},
{
"name": "FEDORA-2008-1603",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html"
},
{
"name": "ADV-2008-1856",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1856/references"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://tomcat.apache.org/security-5.html"
},
{
"name": "39833",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/39833"
},
{
"name": "ADV-2008-0013",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0013"
},
{
"name": "ADV-2008-2780",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2780"
},
{
"name": "RHSA-2008:0831",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0831.html"
},
{
"name": "27006",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/27006"
},
{
"name": "RHSA-2008:0834",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0834.html"
},
{
"name": "DSA-1447",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1447"
},
{
"name": "HPSBST02955",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2"
},
{
"name": "APPLE-SA-2008-10-09",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT3216"
},
{
"name": "29711",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29711"
},
{
"name": "ADV-2009-3316",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"name": "32266",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32266"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2007-5342",
"datePublished": "2007-12-27T22:00:00",
"dateReserved": "2007-10-10T00:00:00",
"dateUpdated": "2024-08-07T15:24:42.402Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2007-5342\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2007-12-27T22:46:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.\"},{\"lang\":\"es\",\"value\":\"La catalina.policy por defecto en el componente de acceso JULI de Apache Tomcat 5.5.9 hasta 5.5.25 y 6.0.0 hasta 6.0.15 no restringe determinados permisos para aplicaciones web, lo cual permite a atacantes remotos modificar opciones de configuraci\u00f3n de acceso y sobrescribir ficheros de su elecci\u00f3n, como se demuestra cambiando los atributos (1) level, (2) directory, y (3) prefix en el gestor org.apache.juli.FileHandler.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:N\",\"baseScore\":6.4,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B0C01D5-773F-469C-9E69-170C2844AAA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB03FDFB-4DBF-4B70-BFA3-570D1DE67695\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F5CF79C-759B-4FF9-90EE-847264059E93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"357651FD-392E-4775-BF20-37A23B3ABAE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585B9476-6B86-4809-9B9E-26112114CB59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6145036D-4FCE-4EBE-A137-BDFA69BA54F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E437055A-0A81-413F-AB08-0E9D0DC9EA30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9276A093-9C98-4617-9941-2276995F5848\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97C9C36C-EF7E-4D42-9749-E2FF6CE35A2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C98575E2-E39A-4A8F-B5B5-BD280B8367BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BDA08E7-A417-44E8-9C89-EB22BEEC3B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCD1B6BE-CF07-4DA8-A703-4A48506C8AD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5878E08E-2741-4798-94E9-BA8E07386B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69F6BAB7-C099-4345-A632-7287AEA555B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3AAF031-D16B-4D51-9581-2D1376A5157B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51120689-F5C0-4DF1-91AA-314C40A46C58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F67477AB-85F6-421C-9C0B-C8EFB1B200CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D11D6FB7-CBDB-48C1-98CB-1B3CAA36C5D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F28C7801-41B9-4552-BA1E-577967BCBBEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25B21085-7259-4685-9D1F-FF98E6489E10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"635EE321-2A1F-4FF8-95BE-0C26591969D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A81B035-8598-4D2C-B45F-C6C9D4B10C2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1096947-82A6-4EA8-A4F2-00D91E3F7DAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EBFA1D3-16A6-4041-BB30-51D2EE0F2AF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B70B372F-EFFD-4AF7-99B5-7D1B23A0C54C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C95ADA4-66F5-45C4-A677-ACE22367A75A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11951A10-39A2-4FF5-8C43-DF94730FB794\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"351E5BCF-A56B-4D91-BA3C-21A4B77D529A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DC2BBB4-171E-4EFF-A575-A5B7FF031755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B6B0504-27C1-4824-A928-A878CBBAB32D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE81AD36-ACD1-4C6C-8E7C-5326D1DA3045\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D903956B-14F5-4177-AF12-0A5F1846D3C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81F847DC-A2F5-456C-9038-16A0E85F4C3B\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://osvdb.org/39833\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28274\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28317\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28915\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/29313\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/29711\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/30676\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/32120\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/32222\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/32266\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/37460\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/57126\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200804-10.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securityreason.com/securityalert/3485\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT3216\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://svn.apache.org/viewvc?view=rev\u0026revision=606594\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://tomcat.apache.org/security-5.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://tomcat.apache.org/security-6.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1447\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:188\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0042.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0195.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0831.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0832.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0833.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0834.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0862.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/485481/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/27006\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/31681\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2008-0010.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0013\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1856/references\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2780\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2823\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/39201\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/39833\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28274\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28317\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28915\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/29313\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/29711\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30676\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32120\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32222\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32266\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/37460\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/57126\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200804-10.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securityreason.com/securityalert/3485\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT3216\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://svn.apache.org/viewvc?view=rev\u0026revision=606594\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://tomcat.apache.org/security-5.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://tomcat.apache.org/security-6.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1447\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:188\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0042.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0195.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0831.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0832.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0833.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0834.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0862.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/485481/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/27006\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/31681\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2008-0010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0013\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1856/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2780\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2823\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/39201\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
rhsa-2008:0195
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat packages that fix multiple security issues are now available\nfor Red Hat Developer Suite 3.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Tomcat is a servlet container for Java Servlet and Java Server Pages\ntechnologies.\n\nTomcat was found treating single quote characters -- \u0027 -- as delimiters in\ncookies. This could allow remote attackers to obtain sensitive information,\nsuch as session IDs, for session hijacking attacks (CVE-2007-3382).\n\nIt was reported Tomcat did not properly handle the following character\nsequence in a cookie: \\\" (a backslash followed by a double-quote). It was\npossible remote attackers could use this failure to obtain sensitive\ninformation, such as session IDs, for session hijacking attacks\n(CVE-2007-3385).\n\nA directory traversal vulnerability existed in the Apache Tomcat webdav\nservlet. This allowed remote attackers to remote authenticated users to\nread accessible to the local user running the tomcat process (CVE-2007-5461).\n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process (CVE-2007-5342).\n\nUsers of Tomcat should update to these erratum packages, which contain\nbackported patches and are not vulnerable to these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0195",
"url": "https://access.redhat.com/errata/RHSA-2008:0195"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "247972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247972"
},
{
"category": "external",
"summary": "247976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247976"
},
{
"category": "external",
"summary": "333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0195.json"
}
],
"title": "Red Hat Security Advisory: tomcat security update",
"tracking": {
"current_release_date": "2025-10-09T12:52:59+00:00",
"generator": {
"date": "2025-10-09T12:52:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2008:0195",
"initial_release_date": "2008-04-28T09:15:00+00:00",
"revision_history": [
{
"date": "2008-04-28T09:15:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-04-28T05:16:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T12:52:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Developer Suite v.3 (AS v.4)",
"product": {
"name": "Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_developer_suite:3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Developer Suite v.3"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_11rh.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_11rh.src",
"product_id": "tomcat5-0:5.5.23-0jpp_11rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_11rh?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_11rh.noarch",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_11rh.noarch",
"product_id": "tomcat5-0:5.5.23-0jpp_11rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_11rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_11rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_11rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_11rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_11rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_11rh?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_11rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_11rh.src as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_11rh.src",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch",
"relates_to_product_reference": "4AS-DS3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-3382",
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "247972"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (\"\u0027\") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat handling of cookies",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3382"
},
{
"category": "external",
"summary": "RHBZ#247972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247972"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3382",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3382"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3382",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3382"
}
],
"release_date": "2007-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-04-28T09:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0195"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat handling of cookies"
},
{
"cve": "CVE-2007-3385",
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "247976"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \\\" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat handling of cookie values",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3385"
},
{
"category": "external",
"summary": "RHBZ#247976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247976"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3385",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3385"
}
],
"release_date": "2007-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-04-28T09:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0195"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat handling of cookie values"
},
{
"cve": "CVE-2007-5342",
"discovery_date": "2007-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427216"
}
],
"notes": [
{
"category": "description",
"text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Tomcat\u0027s default security policy is too open",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5342"
},
{
"category": "external",
"summary": "RHBZ#427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342"
}
],
"release_date": "2007-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-04-28T09:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0195"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Apache Tomcat\u0027s default security policy is too open"
},
{
"cve": "CVE-2007-5461",
"discovery_date": "2007-10-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "333791"
}
],
"notes": [
{
"category": "description",
"text": "Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Absolute path traversal Apache Tomcat WEBDAV",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5461"
},
{
"category": "external",
"summary": "RHBZ#333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461"
}
],
"release_date": "2007-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-04-28T09:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0195"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Absolute path traversal Apache Tomcat WEBDAV"
}
]
}
RHSA-2008:0195
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat packages that fix multiple security issues are now available\nfor Red Hat Developer Suite 3.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Tomcat is a servlet container for Java Servlet and Java Server Pages\ntechnologies.\n\nTomcat was found treating single quote characters -- \u0027 -- as delimiters in\ncookies. This could allow remote attackers to obtain sensitive information,\nsuch as session IDs, for session hijacking attacks (CVE-2007-3382).\n\nIt was reported Tomcat did not properly handle the following character\nsequence in a cookie: \\\" (a backslash followed by a double-quote). It was\npossible remote attackers could use this failure to obtain sensitive\ninformation, such as session IDs, for session hijacking attacks\n(CVE-2007-3385).\n\nA directory traversal vulnerability existed in the Apache Tomcat webdav\nservlet. This allowed remote attackers to remote authenticated users to\nread accessible to the local user running the tomcat process (CVE-2007-5461).\n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process (CVE-2007-5342).\n\nUsers of Tomcat should update to these erratum packages, which contain\nbackported patches and are not vulnerable to these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0195",
"url": "https://access.redhat.com/errata/RHSA-2008:0195"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "247972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247972"
},
{
"category": "external",
"summary": "247976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247976"
},
{
"category": "external",
"summary": "333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0195.json"
}
],
"title": "Red Hat Security Advisory: tomcat security update",
"tracking": {
"current_release_date": "2025-10-09T12:52:59+00:00",
"generator": {
"date": "2025-10-09T12:52:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2008:0195",
"initial_release_date": "2008-04-28T09:15:00+00:00",
"revision_history": [
{
"date": "2008-04-28T09:15:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-04-28T05:16:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T12:52:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Developer Suite v.3 (AS v.4)",
"product": {
"name": "Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_developer_suite:3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Developer Suite v.3"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_11rh.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_11rh.src",
"product_id": "tomcat5-0:5.5.23-0jpp_11rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_11rh?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_11rh.noarch",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_11rh.noarch",
"product_id": "tomcat5-0:5.5.23-0jpp_11rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_11rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_11rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_11rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_11rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_11rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_11rh?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_11rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_11rh.src as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_11rh.src",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch",
"relates_to_product_reference": "4AS-DS3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-3382",
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "247972"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (\"\u0027\") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat handling of cookies",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3382"
},
{
"category": "external",
"summary": "RHBZ#247972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247972"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3382",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3382"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3382",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3382"
}
],
"release_date": "2007-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-04-28T09:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0195"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat handling of cookies"
},
{
"cve": "CVE-2007-3385",
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "247976"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \\\" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat handling of cookie values",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3385"
},
{
"category": "external",
"summary": "RHBZ#247976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247976"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3385",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3385"
}
],
"release_date": "2007-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-04-28T09:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0195"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat handling of cookie values"
},
{
"cve": "CVE-2007-5342",
"discovery_date": "2007-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427216"
}
],
"notes": [
{
"category": "description",
"text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Tomcat\u0027s default security policy is too open",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5342"
},
{
"category": "external",
"summary": "RHBZ#427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342"
}
],
"release_date": "2007-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-04-28T09:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0195"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Apache Tomcat\u0027s default security policy is too open"
},
{
"cve": "CVE-2007-5461",
"discovery_date": "2007-10-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "333791"
}
],
"notes": [
{
"category": "description",
"text": "Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Absolute path traversal Apache Tomcat WEBDAV",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5461"
},
{
"category": "external",
"summary": "RHBZ#333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461"
}
],
"release_date": "2007-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-04-28T09:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0195"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Absolute path traversal Apache Tomcat WEBDAV"
}
]
}
rhsa-2008:0042
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat packages that fix security issues and bugs are now available\nfor Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Tomcat is a servlet container for Java Servlet and JavaServer Pages\ntechnologies.\n\nA directory traversal vulnerability existed in the Apache Tomcat webdav\nservlet. In some configurations it allowed remote authenticated users to\nread files accessible to the local tomcat process. (CVE-2007-5461)\n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process. (CVE-2007-5342)\n\nUsers of Tomcat should update to these errata packages, which contain\nbackported patches and are not vulnerable to these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0042",
"url": "https://access.redhat.com/errata/RHSA-2008:0042"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#moderate",
"url": "http://www.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0042.json"
}
],
"title": "Red Hat Security Advisory: tomcat security update",
"tracking": {
"current_release_date": "2025-10-09T13:07:01+00:00",
"generator": {
"date": "2025-10-09T13:07:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2008:0042",
"initial_release_date": "2008-03-11T10:51:00+00:00",
"revision_history": [
{
"date": "2008-03-11T10:51:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-03-11T06:51:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T13:07:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5342",
"discovery_date": "2007-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427216"
}
],
"notes": [
{
"category": "description",
"text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Tomcat\u0027s default security policy is too open",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5342"
},
{
"category": "external",
"summary": "RHBZ#427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342"
}
],
"release_date": "2007-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-03-11T10:51:00+00:00",
"details": "This update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0042"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Apache Tomcat\u0027s default security policy is too open"
},
{
"cve": "CVE-2007-5461",
"discovery_date": "2007-10-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "333791"
}
],
"notes": [
{
"category": "description",
"text": "Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Absolute path traversal Apache Tomcat WEBDAV",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5461"
},
{
"category": "external",
"summary": "RHBZ#333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461"
}
],
"release_date": "2007-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-03-11T10:51:00+00:00",
"details": "This update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0042"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Absolute path traversal Apache Tomcat WEBDAV"
}
]
}
RHSA-2008:0042
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat packages that fix security issues and bugs are now available\nfor Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Tomcat is a servlet container for Java Servlet and JavaServer Pages\ntechnologies.\n\nA directory traversal vulnerability existed in the Apache Tomcat webdav\nservlet. In some configurations it allowed remote authenticated users to\nread files accessible to the local tomcat process. (CVE-2007-5461)\n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process. (CVE-2007-5342)\n\nUsers of Tomcat should update to these errata packages, which contain\nbackported patches and are not vulnerable to these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0042",
"url": "https://access.redhat.com/errata/RHSA-2008:0042"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#moderate",
"url": "http://www.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0042.json"
}
],
"title": "Red Hat Security Advisory: tomcat security update",
"tracking": {
"current_release_date": "2025-10-09T13:07:01+00:00",
"generator": {
"date": "2025-10-09T13:07:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2008:0042",
"initial_release_date": "2008-03-11T10:51:00+00:00",
"revision_history": [
{
"date": "2008-03-11T10:51:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-03-11T06:51:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T13:07:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5342",
"discovery_date": "2007-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427216"
}
],
"notes": [
{
"category": "description",
"text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Tomcat\u0027s default security policy is too open",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5342"
},
{
"category": "external",
"summary": "RHBZ#427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342"
}
],
"release_date": "2007-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-03-11T10:51:00+00:00",
"details": "This update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0042"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Apache Tomcat\u0027s default security policy is too open"
},
{
"cve": "CVE-2007-5461",
"discovery_date": "2007-10-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "333791"
}
],
"notes": [
{
"category": "description",
"text": "Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Absolute path traversal Apache Tomcat WEBDAV",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5461"
},
{
"category": "external",
"summary": "RHBZ#333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461"
}
],
"release_date": "2007-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-03-11T10:51:00+00:00",
"details": "This update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0042"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Absolute path traversal Apache Tomcat WEBDAV"
}
]
}
RHSA-2008:0832
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix\nvarious security issues are now available for Red Hat Enterprise Linux 5 as\nJBEAP 4.3.0.CP02.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 5 serves as a\nreplacement to JBEAP 4.3.0.CP01.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the release notes. The link to the release notes is available\nbelow in the References section.\n\nThe following security issues are also fixed with this release: \n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process. (CVE-2007-5342)\n\nThe property that controls the download of server classes was set to \"true\"\nin the \"production\" configuration. When the class download service is bound\nto an external interface, a remote attacker was able to download arbitrary\nclass files from the server class path. (CVE-2008-3519)\n\nWarning: before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.3 on Red Hat Enterprise Linux 5 are advised to upgrade\nto these updated packages, which resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0832",
"url": "https://access.redhat.com/errata/RHSA-2008:0832"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.3.0.cp02/html-single/readme/index.html",
"url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.3.0.cp02/html-single/readme/index.html"
},
{
"category": "external",
"summary": "458713",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458713"
},
{
"category": "external",
"summary": "458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0832.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0CP02 security update",
"tracking": {
"current_release_date": "2025-10-09T13:07:16+00:00",
"generator": {
"date": "2025-10-09T13:07:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2008:0832",
"initial_release_date": "2008-09-22T13:27:00+00:00",
"revision_history": [
{
"date": "2008-09-22T13:27:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-09-22T09:27:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T13:07:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"product": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"product": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.2.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"product": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"product": {
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"product_id": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.8.0-1jpp.ep1.2.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"product": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"product": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"product": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"product": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"product_id": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-1.SP3_CP03.0jpp.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"product": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"product": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"product_id": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-common@1.0.0-1.GA_CP01.0jpp.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_id": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"product": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"product_id": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-0jpp.ep1.11.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_id": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.2.1-2.GA_CP03.1jpp.ep1.9.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP04.0jpp.ep1.3.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"product": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"product_id": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxws@2.1.1-1jpp.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch",
"product": {
"name": "rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch",
"product_id": "rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-2.GA_CP02.ep1.6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"product": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"product_id": "glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1jpp.ep1.4.el5.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"product": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"product_id": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws@2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"product": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"product_id": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.3.0-2.GA_CP02.ep1.10.el5.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"product": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"product_id": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"product": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"product": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.2.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"product": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"product_id": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-1.SP3_CP03.0jpp.ep1.3.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"product": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"product_id": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.3.0-2.GA_CP02.ep1.10.el5.2?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"product": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch"
},
"product_reference": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch"
},
"product_reference": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch"
},
"product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src"
},
"product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch"
},
"product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src"
},
"product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch"
},
"product_reference": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch"
},
"product_reference": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch"
},
"product_reference": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch"
},
"product_reference": "rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5342",
"discovery_date": "2007-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427216"
}
],
"notes": [
{
"category": "description",
"text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Tomcat\u0027s default security policy is too open",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"5Server-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5342"
},
{
"category": "external",
"summary": "RHBZ#427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342"
}
],
"release_date": "2007-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T13:27:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"5Server-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0832"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Apache Tomcat\u0027s default security policy is too open"
},
{
"cve": "CVE-2008-3519",
"discovery_date": "2008-04-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458823"
}
],
"notes": [
{
"category": "description",
"text": "The default configuration of the JBossAs component in Red Hat JBoss Enterprise Application Platform (aka JBossEAP or EAP), possibly 4.2 before CP04 and 4.3 before CP02, when a production environment is enabled, sets the DownloadServerClasses property to true, which allows remote attackers to obtain sensitive information (non-EJB classes) via a download request, a different vulnerability than CVE-2008-3273.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBossEAP allows download of non-EJB class files",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"5Server-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3519"
},
{
"category": "external",
"summary": "RHBZ#458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3519",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3519"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519"
}
],
"release_date": "2008-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T13:27:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"5Server-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0832"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JBossEAP allows download of non-EJB class files"
}
]
}
rhsa-2008_0862
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat packages that fix several security issues are now available\nfor Red Hat Application Server v2.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\nTomcat process. (CVE-2007-5342)\n\nA directory traversal vulnerability was discovered in the Apache Tomcat\nwebdav servlet. Under certain configurations, this allowed remote,\nauthenticated users to read files accessible to the local Tomcat process.\n(CVE-2007-5461)\n\nA cross-site scripting vulnerability was discovered in the\nHttpServletResponse.sendError() method. A remote attacker could inject\narbitrary web script or HTML via forged HTTP headers. (CVE-2008-1232)\n\nAn additional cross-site scripting vulnerability was discovered in the host\nmanager application. A remote attacker could inject arbitrary web script or\nHTML via the hostname parameter. (CVE-2008-1947)\n\nA traversal vulnerability was discovered when using a RequestDispatcher\nin combination with a servlet or JSP. A remote attacker could utilize a\nspecially-crafted request parameter to access protected web resources.\n(CVE-2008-2370)\n\nAn additional traversal vulnerability was discovered when the\n\"allowLinking\" and \"URIencoding\" settings were activated. A remote attacker\ncould use a UTF-8-encoded request to extend their privileges and obtain\nlocal files accessible to the Tomcat process. (CVE-2008-2938)\n\nUsers of tomcat should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0862",
"url": "https://access.redhat.com/errata/RHSA-2008:0862"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "446393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=446393"
},
{
"category": "external",
"summary": "456120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=456120"
},
{
"category": "external",
"summary": "457597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457597"
},
{
"category": "external",
"summary": "457934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457934"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0862.json"
}
],
"title": "Red Hat Security Advisory: tomcat security update",
"tracking": {
"current_release_date": "2024-11-22T02:13:30+00:00",
"generator": {
"date": "2024-11-22T02:13:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2008:0862",
"initial_release_date": "2008-10-02T14:03:00+00:00",
"revision_history": [
{
"date": "2008-10-02T14:03:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-10-02T10:03:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T02:13:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Application Server v2 4AS",
"product": {
"name": "Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
},
{
"category": "product_name",
"name": "Red Hat Application Server v2 4ES",
"product": {
"name": "Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
},
{
"category": "product_name",
"name": "Red Hat Application Server v2 4WS",
"product": {
"name": "Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
}
],
"category": "product_family",
"name": "Red Hat Application Server"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.src",
"product_id": "tomcat5-0:5.5.23-0jpp_4rh.9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.src as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.src",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.src as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.src",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.src as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.src",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5342",
"discovery_date": "2007-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427216"
}
],
"notes": [
{
"category": "description",
"text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Tomcat\u0027s default security policy is too open",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5342"
},
{
"category": "external",
"summary": "RHBZ#427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342"
}
],
"release_date": "2007-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-02T14:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0862"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Apache Tomcat\u0027s default security policy is too open"
},
{
"cve": "CVE-2007-5461",
"discovery_date": "2007-10-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "333791"
}
],
"notes": [
{
"category": "description",
"text": "Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Absolute path traversal Apache Tomcat WEBDAV",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5461"
},
{
"category": "external",
"summary": "RHBZ#333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461"
}
],
"release_date": "2007-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-02T14:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0862"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Absolute path traversal Apache Tomcat WEBDAV"
},
{
"cve": "CVE-2008-1232",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2008-08-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "457597"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Cross-Site-Scripting enabled by sendError call",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1232"
},
{
"category": "external",
"summary": "RHBZ#457597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457597"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1232",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1232"
}
],
"release_date": "2008-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-02T14:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0862"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: Cross-Site-Scripting enabled by sendError call"
},
{
"cve": "CVE-2008-1947",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2008-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "446393"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Apache Tomcat 5.5.9 through 5.5.26 and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via the name parameter (aka the hostname attribute) to host-manager/html/add.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Tomcat host manager xss - name field",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1947"
},
{
"category": "external",
"summary": "RHBZ#446393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=446393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1947",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1947"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1947",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1947"
}
],
"release_date": "2008-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-02T14:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0862"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Tomcat host manager xss - name field"
},
{
"cve": "CVE-2008-2370",
"discovery_date": "2008-08-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "457934"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat RequestDispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2370"
},
{
"category": "external",
"summary": "RHBZ#457934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2370"
}
],
"release_date": "2008-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-02T14:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0862"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat RequestDispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2008-2938",
"discovery_date": "2008-07-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "456120"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370. NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat Unicode directory traversal vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2938"
},
{
"category": "external",
"summary": "RHBZ#456120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=456120"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2938"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2938",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2938"
}
],
"release_date": "2008-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-02T14:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0862"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat Unicode directory traversal vulnerability"
}
]
}
RHSA-2008:0833
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.2 packages that fix\nvarious security issues are now available for Red Hat Enterprise Linux 4 as\nJBEAP 4.2.0.CP04.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 4 serves as a\nreplacement to JBEAP 4.2.0.CP03.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the release notes. The link to the release notes is available\nbelow in the References section.\n\nThe following security issues are also fixed with this release: \n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process. (CVE-2007-5342)\n\nThe property that controls the download of server classes was set to \"true\"\nin the \"production\" configuration. When the class download service is bound\nto an external interface, a remote attacker was able to download arbitrary\nclass files from the server class path. (CVE-2008-3519)\n\nWarning: before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.2 on Red Hat Enterprise Linux 4 are advised to upgrade\nto these updated packages, which resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0833",
"url": "https://access.redhat.com/errata/RHSA-2008:0833"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp04/html-single/readme/index.html",
"url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp04/html-single/readme/index.html"
},
{
"category": "external",
"summary": "427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "456973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=456973"
},
{
"category": "external",
"summary": "458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0833.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0CP04 security update",
"tracking": {
"current_release_date": "2025-10-09T13:07:15+00:00",
"generator": {
"date": "2025-10-09T13:07:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2008:0833",
"initial_release_date": "2008-09-22T12:50:00+00:00",
"revision_history": [
{
"date": "2008-09-22T12:50:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-09-22T08:50:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T13:07:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"product": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"product": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"product_id": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-beanutils@1.7.0-2jpp.ep1.5.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"product": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.8.0-1.ep1.el4.src",
"product": {
"name": "javassist-0:3.8.0-1.ep1.el4.src",
"product_id": "javassist-0:3.8.0-1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.8.0-1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"product": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"product": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.1.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"product": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"product": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"product": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"product": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"product": {
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"product_id": "jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.10.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"product": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"product": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"product": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"product_id": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-4.GA_CP04.ep1.5.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"product": {
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"product_id": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.2.0-3.GA_CP04.ep1.8.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_id": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"product": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"product_id": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-beanutils@1.7.0-2jpp.ep1.5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"product": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.8.0-1.ep1.el4.noarch",
"product": {
"name": "javassist-0:3.8.0-1.ep1.el4.noarch",
"product_id": "javassist-0:3.8.0-1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.8.0-1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"product": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"product": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.1.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"product": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"product": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"product": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"product": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"product": {
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"product_id": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"product": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"product_id": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-1.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_id": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"product": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"product": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"product_id": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-4.GA_CP04.ep1.5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"product": {
"name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"product_id": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.2.0-4.GA_CP04.ep1.5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"product": {
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"product_id": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.2.0-3.GA_CP04.ep1.8.el4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.src"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch"
},
"product_reference": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src"
},
"product_reference": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
},
"product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src"
},
"product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.src"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch"
},
"product_reference": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src"
},
"product_reference": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
},
"product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src"
},
"product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5342",
"discovery_date": "2007-10-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427216"
}
],
"notes": [
{
"category": "description",
"text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Tomcat\u0027s default security policy is too open",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
],
"known_not_affected": [
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5342"
},
{
"category": "external",
"summary": "RHBZ#427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342"
}
],
"release_date": "2007-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T12:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0833"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Apache Tomcat\u0027s default security policy is too open"
},
{
"cve": "CVE-2008-3519",
"discovery_date": "2008-04-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458823"
}
],
"notes": [
{
"category": "description",
"text": "The default configuration of the JBossAs component in Red Hat JBoss Enterprise Application Platform (aka JBossEAP or EAP), possibly 4.2 before CP04 and 4.3 before CP02, when a production environment is enabled, sets the DownloadServerClasses property to true, which allows remote attackers to obtain sensitive information (non-EJB classes) via a download request, a different vulnerability than CVE-2008-3273.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBossEAP allows download of non-EJB class files",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
],
"known_not_affected": [
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3519"
},
{
"category": "external",
"summary": "RHBZ#458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3519",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3519"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519"
}
],
"release_date": "2008-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T12:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0833"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JBossEAP allows download of non-EJB class files"
}
]
}
rhsa-2008:0832
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix\nvarious security issues are now available for Red Hat Enterprise Linux 5 as\nJBEAP 4.3.0.CP02.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 5 serves as a\nreplacement to JBEAP 4.3.0.CP01.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the release notes. The link to the release notes is available\nbelow in the References section.\n\nThe following security issues are also fixed with this release: \n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process. (CVE-2007-5342)\n\nThe property that controls the download of server classes was set to \"true\"\nin the \"production\" configuration. When the class download service is bound\nto an external interface, a remote attacker was able to download arbitrary\nclass files from the server class path. (CVE-2008-3519)\n\nWarning: before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.3 on Red Hat Enterprise Linux 5 are advised to upgrade\nto these updated packages, which resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0832",
"url": "https://access.redhat.com/errata/RHSA-2008:0832"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.3.0.cp02/html-single/readme/index.html",
"url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.3.0.cp02/html-single/readme/index.html"
},
{
"category": "external",
"summary": "458713",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458713"
},
{
"category": "external",
"summary": "458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0832.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0CP02 security update",
"tracking": {
"current_release_date": "2025-10-09T13:07:16+00:00",
"generator": {
"date": "2025-10-09T13:07:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2008:0832",
"initial_release_date": "2008-09-22T13:27:00+00:00",
"revision_history": [
{
"date": "2008-09-22T13:27:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-09-22T09:27:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T13:07:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"product": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"product": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.2.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"product": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"product": {
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"product_id": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.8.0-1jpp.ep1.2.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"product": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"product": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"product": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"product": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"product_id": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-1.SP3_CP03.0jpp.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"product": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"product": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"product_id": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-common@1.0.0-1.GA_CP01.0jpp.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_id": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"product": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"product_id": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-0jpp.ep1.11.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_id": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.2.1-2.GA_CP03.1jpp.ep1.9.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP04.0jpp.ep1.3.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"product": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"product_id": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxws@2.1.1-1jpp.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch",
"product": {
"name": "rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch",
"product_id": "rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-2.GA_CP02.ep1.6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"product": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"product_id": "glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1jpp.ep1.4.el5.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"product": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"product_id": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws@2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"product": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"product_id": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.3.0-2.GA_CP02.ep1.10.el5.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"product": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"product_id": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"product": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"product": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.2.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"product": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"product_id": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-1.SP3_CP03.0jpp.ep1.3.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"product": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"product_id": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.3.0-2.GA_CP02.ep1.10.el5.2?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"product": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch"
},
"product_reference": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch"
},
"product_reference": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch"
},
"product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src"
},
"product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch"
},
"product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src"
},
"product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch"
},
"product_reference": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch"
},
"product_reference": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch"
},
"product_reference": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch"
},
"product_reference": "rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5342",
"discovery_date": "2007-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427216"
}
],
"notes": [
{
"category": "description",
"text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Tomcat\u0027s default security policy is too open",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"5Server-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5342"
},
{
"category": "external",
"summary": "RHBZ#427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342"
}
],
"release_date": "2007-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T13:27:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"5Server-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0832"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Apache Tomcat\u0027s default security policy is too open"
},
{
"cve": "CVE-2008-3519",
"discovery_date": "2008-04-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458823"
}
],
"notes": [
{
"category": "description",
"text": "The default configuration of the JBossAs component in Red Hat JBoss Enterprise Application Platform (aka JBossEAP or EAP), possibly 4.2 before CP04 and 4.3 before CP02, when a production environment is enabled, sets the DownloadServerClasses property to true, which allows remote attackers to obtain sensitive information (non-EJB classes) via a download request, a different vulnerability than CVE-2008-3273.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBossEAP allows download of non-EJB class files",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"5Server-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3519"
},
{
"category": "external",
"summary": "RHBZ#458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3519",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3519"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519"
}
],
"release_date": "2008-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T13:27:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"5Server-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0832"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JBossEAP allows download of non-EJB class files"
}
]
}
RHSA-2008:0862
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat packages that fix several security issues are now available\nfor Red Hat Application Server v2.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\nTomcat process. (CVE-2007-5342)\n\nA directory traversal vulnerability was discovered in the Apache Tomcat\nwebdav servlet. Under certain configurations, this allowed remote,\nauthenticated users to read files accessible to the local Tomcat process.\n(CVE-2007-5461)\n\nA cross-site scripting vulnerability was discovered in the\nHttpServletResponse.sendError() method. A remote attacker could inject\narbitrary web script or HTML via forged HTTP headers. (CVE-2008-1232)\n\nAn additional cross-site scripting vulnerability was discovered in the host\nmanager application. A remote attacker could inject arbitrary web script or\nHTML via the hostname parameter. (CVE-2008-1947)\n\nA traversal vulnerability was discovered when using a RequestDispatcher\nin combination with a servlet or JSP. A remote attacker could utilize a\nspecially-crafted request parameter to access protected web resources.\n(CVE-2008-2370)\n\nAn additional traversal vulnerability was discovered when the\n\"allowLinking\" and \"URIencoding\" settings were activated. A remote attacker\ncould use a UTF-8-encoded request to extend their privileges and obtain\nlocal files accessible to the Tomcat process. (CVE-2008-2938)\n\nUsers of tomcat should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0862",
"url": "https://access.redhat.com/errata/RHSA-2008:0862"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "446393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=446393"
},
{
"category": "external",
"summary": "456120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=456120"
},
{
"category": "external",
"summary": "457597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457597"
},
{
"category": "external",
"summary": "457934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457934"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0862.json"
}
],
"title": "Red Hat Security Advisory: tomcat security update",
"tracking": {
"current_release_date": "2025-10-09T13:06:44+00:00",
"generator": {
"date": "2025-10-09T13:06:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2008:0862",
"initial_release_date": "2008-10-02T14:03:00+00:00",
"revision_history": [
{
"date": "2008-10-02T14:03:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-10-02T10:03:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T13:06:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Application Server v2 4AS",
"product": {
"name": "Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
},
{
"category": "product_name",
"name": "Red Hat Application Server v2 4ES",
"product": {
"name": "Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
},
{
"category": "product_name",
"name": "Red Hat Application Server v2 4WS",
"product": {
"name": "Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
}
],
"category": "product_family",
"name": "Red Hat Application Server"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.src",
"product_id": "tomcat5-0:5.5.23-0jpp_4rh.9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.src as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.src",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.src as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.src",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.src as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.src",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5342",
"discovery_date": "2007-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427216"
}
],
"notes": [
{
"category": "description",
"text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Tomcat\u0027s default security policy is too open",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5342"
},
{
"category": "external",
"summary": "RHBZ#427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342"
}
],
"release_date": "2007-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-02T14:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0862"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Apache Tomcat\u0027s default security policy is too open"
},
{
"cve": "CVE-2007-5461",
"discovery_date": "2007-10-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "333791"
}
],
"notes": [
{
"category": "description",
"text": "Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Absolute path traversal Apache Tomcat WEBDAV",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5461"
},
{
"category": "external",
"summary": "RHBZ#333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461"
}
],
"release_date": "2007-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-02T14:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0862"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Absolute path traversal Apache Tomcat WEBDAV"
},
{
"cve": "CVE-2008-1232",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2008-08-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "457597"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Cross-Site-Scripting enabled by sendError call",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1232"
},
{
"category": "external",
"summary": "RHBZ#457597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457597"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1232",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1232"
}
],
"release_date": "2008-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-02T14:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0862"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: Cross-Site-Scripting enabled by sendError call"
},
{
"cve": "CVE-2008-1947",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2008-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "446393"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Apache Tomcat 5.5.9 through 5.5.26 and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via the name parameter (aka the hostname attribute) to host-manager/html/add.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Tomcat host manager xss - name field",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1947"
},
{
"category": "external",
"summary": "RHBZ#446393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=446393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1947",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1947"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1947",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1947"
}
],
"release_date": "2008-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-02T14:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0862"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Tomcat host manager xss - name field"
},
{
"cve": "CVE-2008-2370",
"discovery_date": "2008-08-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "457934"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat RequestDispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2370"
},
{
"category": "external",
"summary": "RHBZ#457934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2370"
}
],
"release_date": "2008-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-02T14:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0862"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat RequestDispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2008-2938",
"discovery_date": "2008-07-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "456120"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370. NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat Unicode directory traversal vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2938"
},
{
"category": "external",
"summary": "RHBZ#456120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=456120"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2938"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2938",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2938"
}
],
"release_date": "2008-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-02T14:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0862"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat Unicode directory traversal vulnerability"
}
]
}
rhsa-2008_0042
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat packages that fix security issues and bugs are now available\nfor Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Tomcat is a servlet container for Java Servlet and JavaServer Pages\ntechnologies.\n\nA directory traversal vulnerability existed in the Apache Tomcat webdav\nservlet. In some configurations it allowed remote authenticated users to\nread files accessible to the local tomcat process. (CVE-2007-5461)\n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process. (CVE-2007-5342)\n\nUsers of Tomcat should update to these errata packages, which contain\nbackported patches and are not vulnerable to these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0042",
"url": "https://access.redhat.com/errata/RHSA-2008:0042"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#moderate",
"url": "http://www.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0042.json"
}
],
"title": "Red Hat Security Advisory: tomcat security update",
"tracking": {
"current_release_date": "2024-11-22T02:13:18+00:00",
"generator": {
"date": "2024-11-22T02:13:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2008:0042",
"initial_release_date": "2008-03-11T10:51:00+00:00",
"revision_history": [
{
"date": "2008-03-11T10:51:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-03-11T06:51:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T02:13:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.3.el5_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.3.el5_1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.3.el5_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5342",
"discovery_date": "2007-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427216"
}
],
"notes": [
{
"category": "description",
"text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Tomcat\u0027s default security policy is too open",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5342"
},
{
"category": "external",
"summary": "RHBZ#427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342"
}
],
"release_date": "2007-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-03-11T10:51:00+00:00",
"details": "This update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0042"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Apache Tomcat\u0027s default security policy is too open"
},
{
"cve": "CVE-2007-5461",
"discovery_date": "2007-10-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "333791"
}
],
"notes": [
{
"category": "description",
"text": "Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Absolute path traversal Apache Tomcat WEBDAV",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5461"
},
{
"category": "external",
"summary": "RHBZ#333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461"
}
],
"release_date": "2007-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-03-11T10:51:00+00:00",
"details": "This update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.src",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.3.el5_1.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.3.el5_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0042"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Absolute path traversal Apache Tomcat WEBDAV"
}
]
}
RHSA-2008:0831
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix\nvarious security issues are now available for Red Hat Enterprise Linux 4 as\nJBEAP 4.3.0.CP02.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 4 serves as a\nreplacement to JBEAP 4.3.0.CP01.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the release notes. The link to the release notes is available\nbelow in the References section.\n\nThe following security issues are also fixed with this release: \n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process. (CVE-2007-5342)\n\nThe property that controls the download of server classes was set to \"true\"\nin the \"production\" configuration. When the class download service is bound\nto an external interface, a remote attacker was able to download arbitrary\nclass files from the server class path. (CVE-2008-3519)\n\nWarning: before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.3 on Red Hat Enterprise Linux 4 are advised to upgrade\nto these updated packages, which resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0831",
"url": "https://access.redhat.com/errata/RHSA-2008:0831"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.3.0.cp02/html-single/readme/index.html",
"url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.3.0.cp02/html-single/readme/index.html"
},
{
"category": "external",
"summary": "427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "456975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=456975"
},
{
"category": "external",
"summary": "458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0831.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0CP02 security update",
"tracking": {
"current_release_date": "2025-10-09T13:07:14+00:00",
"generator": {
"date": "2025-10-09T13:07:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2008:0831",
"initial_release_date": "2008-09-22T13:02:00+00:00",
"revision_history": [
{
"date": "2008-09-22T13:02:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-09-22T09:02:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T13:07:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"product": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"product_id": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-beanutils@1.7.0-2jpp.ep1.5.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"product": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"product": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.8.0-1.ep1.el4.src",
"product": {
"name": "javassist-0:3.8.0-1.ep1.el4.src",
"product_id": "javassist-0:3.8.0-1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.8.0-1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"product": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"product": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.1.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"product": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"product": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"product": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"product_id": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-common@1.0.0-1.GA_CP01.0jpp.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"product": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"product_id": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-0jpp.ep1.11.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"product": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"product": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"product": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"product_id": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxws@2.1.1-1jpp.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"product": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"product_id": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1jpp.ep1.2.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"product": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"product": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"product": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"product": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"product_id": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-1.SP3_CP03.0jpp.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"product": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"product_id": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws@2.0.1-2.SP2_CP03.0jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"product": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"product_id": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.3.0-2.GA_CP02.ep1.10.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"product": {
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"product_id": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-3.GA_CP02.ep1.9.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"product": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"product_id": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-beanutils@1.7.0-2jpp.ep1.5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_id": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"product": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.8.0-1.ep1.el4.noarch",
"product": {
"name": "javassist-0:3.8.0-1.ep1.el4.noarch",
"product_id": "javassist-0:3.8.0-1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.8.0-1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"product": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"product": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.1.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"product": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"product": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"product": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"product_id": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-common@1.0.0-1.GA_CP01.0jpp.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"product": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"product_id": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-0jpp.ep1.11.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"product": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"product": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"product": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"product_id": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxws@2.1.1-1jpp.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"product": {
"name": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"product_id": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-javadoc@2.1.4-1jpp.ep1.2.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"product": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"product_id": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1jpp.ep1.2.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"product": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"product": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"product_id": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_id": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"product": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"product": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"product_id": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-1.SP3_CP03.0jpp.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"product": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"product_id": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws@2.0.1-2.SP2_CP03.0jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"product": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"product_id": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.3.0-2.GA_CP02.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"product": {
"name": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"product_id": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.3.0-3.GA_CP02.ep1.9.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"product": {
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"product_id": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-3.GA_CP02.ep1.9.el4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch"
},
"product_reference": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch"
},
"product_reference": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src"
},
"product_reference": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src"
},
"product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch"
},
"product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src"
},
"product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src"
},
"product_reference": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src"
},
"product_reference": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch"
},
"product_reference": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src"
},
"product_reference": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
},
"product_reference": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src"
},
"product_reference": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch"
},
"product_reference": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch"
},
"product_reference": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src"
},
"product_reference": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src"
},
"product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch"
},
"product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src"
},
"product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src"
},
"product_reference": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src"
},
"product_reference": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch"
},
"product_reference": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src"
},
"product_reference": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
},
"product_reference": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src"
},
"product_reference": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5342",
"discovery_date": "2007-10-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427216"
}
],
"notes": [
{
"category": "description",
"text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Tomcat\u0027s default security policy is too open",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
],
"known_not_affected": [
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5342"
},
{
"category": "external",
"summary": "RHBZ#427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342"
}
],
"release_date": "2007-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T13:02:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0831"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Apache Tomcat\u0027s default security policy is too open"
},
{
"cve": "CVE-2008-3519",
"discovery_date": "2008-04-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458823"
}
],
"notes": [
{
"category": "description",
"text": "The default configuration of the JBossAs component in Red Hat JBoss Enterprise Application Platform (aka JBossEAP or EAP), possibly 4.2 before CP04 and 4.3 before CP02, when a production environment is enabled, sets the DownloadServerClasses property to true, which allows remote attackers to obtain sensitive information (non-EJB classes) via a download request, a different vulnerability than CVE-2008-3273.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBossEAP allows download of non-EJB class files",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
],
"known_not_affected": [
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3519"
},
{
"category": "external",
"summary": "RHBZ#458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3519",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3519"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519"
}
],
"release_date": "2008-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T13:02:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0831"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JBossEAP allows download of non-EJB class files"
}
]
}
rhsa-2008:0862
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat packages that fix several security issues are now available\nfor Red Hat Application Server v2.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\nTomcat process. (CVE-2007-5342)\n\nA directory traversal vulnerability was discovered in the Apache Tomcat\nwebdav servlet. Under certain configurations, this allowed remote,\nauthenticated users to read files accessible to the local Tomcat process.\n(CVE-2007-5461)\n\nA cross-site scripting vulnerability was discovered in the\nHttpServletResponse.sendError() method. A remote attacker could inject\narbitrary web script or HTML via forged HTTP headers. (CVE-2008-1232)\n\nAn additional cross-site scripting vulnerability was discovered in the host\nmanager application. A remote attacker could inject arbitrary web script or\nHTML via the hostname parameter. (CVE-2008-1947)\n\nA traversal vulnerability was discovered when using a RequestDispatcher\nin combination with a servlet or JSP. A remote attacker could utilize a\nspecially-crafted request parameter to access protected web resources.\n(CVE-2008-2370)\n\nAn additional traversal vulnerability was discovered when the\n\"allowLinking\" and \"URIencoding\" settings were activated. A remote attacker\ncould use a UTF-8-encoded request to extend their privileges and obtain\nlocal files accessible to the Tomcat process. (CVE-2008-2938)\n\nUsers of tomcat should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0862",
"url": "https://access.redhat.com/errata/RHSA-2008:0862"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "446393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=446393"
},
{
"category": "external",
"summary": "456120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=456120"
},
{
"category": "external",
"summary": "457597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457597"
},
{
"category": "external",
"summary": "457934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457934"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0862.json"
}
],
"title": "Red Hat Security Advisory: tomcat security update",
"tracking": {
"current_release_date": "2025-10-09T13:06:44+00:00",
"generator": {
"date": "2025-10-09T13:06:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2008:0862",
"initial_release_date": "2008-10-02T14:03:00+00:00",
"revision_history": [
{
"date": "2008-10-02T14:03:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-10-02T10:03:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T13:06:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Application Server v2 4AS",
"product": {
"name": "Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
},
{
"category": "product_name",
"name": "Red Hat Application Server v2 4ES",
"product": {
"name": "Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
},
{
"category": "product_name",
"name": "Red Hat Application Server v2 4WS",
"product": {
"name": "Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
}
],
"category": "product_family",
"name": "Red Hat Application Server"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_4rh.9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.src",
"product_id": "tomcat5-0:5.5.23-0jpp_4rh.9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.src as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.src",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.src as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.src",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.9.src as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.9.src",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5342",
"discovery_date": "2007-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427216"
}
],
"notes": [
{
"category": "description",
"text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Tomcat\u0027s default security policy is too open",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5342"
},
{
"category": "external",
"summary": "RHBZ#427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342"
}
],
"release_date": "2007-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-02T14:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0862"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Apache Tomcat\u0027s default security policy is too open"
},
{
"cve": "CVE-2007-5461",
"discovery_date": "2007-10-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "333791"
}
],
"notes": [
{
"category": "description",
"text": "Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Absolute path traversal Apache Tomcat WEBDAV",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5461"
},
{
"category": "external",
"summary": "RHBZ#333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461"
}
],
"release_date": "2007-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-02T14:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0862"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Absolute path traversal Apache Tomcat WEBDAV"
},
{
"cve": "CVE-2008-1232",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2008-08-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "457597"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Cross-Site-Scripting enabled by sendError call",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1232"
},
{
"category": "external",
"summary": "RHBZ#457597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457597"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1232",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1232"
}
],
"release_date": "2008-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-02T14:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0862"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: Cross-Site-Scripting enabled by sendError call"
},
{
"cve": "CVE-2008-1947",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2008-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "446393"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Apache Tomcat 5.5.9 through 5.5.26 and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via the name parameter (aka the hostname attribute) to host-manager/html/add.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Tomcat host manager xss - name field",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1947"
},
{
"category": "external",
"summary": "RHBZ#446393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=446393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1947",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1947"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1947",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1947"
}
],
"release_date": "2008-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-02T14:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0862"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Tomcat host manager xss - name field"
},
{
"cve": "CVE-2008-2370",
"discovery_date": "2008-08-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "457934"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat RequestDispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2370"
},
{
"category": "external",
"summary": "RHBZ#457934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2370"
}
],
"release_date": "2008-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-02T14:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0862"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat RequestDispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2008-2938",
"discovery_date": "2008-07-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "456120"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370. NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat Unicode directory traversal vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2938"
},
{
"category": "external",
"summary": "RHBZ#456120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=456120"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2938"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2938",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2938"
}
],
"release_date": "2008-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-02T14:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.9.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.9.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0862"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat Unicode directory traversal vulnerability"
}
]
}
rhsa-2008:0833
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.2 packages that fix\nvarious security issues are now available for Red Hat Enterprise Linux 4 as\nJBEAP 4.2.0.CP04.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 4 serves as a\nreplacement to JBEAP 4.2.0.CP03.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the release notes. The link to the release notes is available\nbelow in the References section.\n\nThe following security issues are also fixed with this release: \n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process. (CVE-2007-5342)\n\nThe property that controls the download of server classes was set to \"true\"\nin the \"production\" configuration. When the class download service is bound\nto an external interface, a remote attacker was able to download arbitrary\nclass files from the server class path. (CVE-2008-3519)\n\nWarning: before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.2 on Red Hat Enterprise Linux 4 are advised to upgrade\nto these updated packages, which resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0833",
"url": "https://access.redhat.com/errata/RHSA-2008:0833"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp04/html-single/readme/index.html",
"url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp04/html-single/readme/index.html"
},
{
"category": "external",
"summary": "427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "456973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=456973"
},
{
"category": "external",
"summary": "458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0833.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0CP04 security update",
"tracking": {
"current_release_date": "2025-10-09T13:07:15+00:00",
"generator": {
"date": "2025-10-09T13:07:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2008:0833",
"initial_release_date": "2008-09-22T12:50:00+00:00",
"revision_history": [
{
"date": "2008-09-22T12:50:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-09-22T08:50:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T13:07:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"product": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"product": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"product_id": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-beanutils@1.7.0-2jpp.ep1.5.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"product": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.8.0-1.ep1.el4.src",
"product": {
"name": "javassist-0:3.8.0-1.ep1.el4.src",
"product_id": "javassist-0:3.8.0-1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.8.0-1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"product": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"product": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.1.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"product": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"product": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"product": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"product": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"product": {
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"product_id": "jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.10.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"product": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"product": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"product": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"product_id": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-4.GA_CP04.ep1.5.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"product": {
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"product_id": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.2.0-3.GA_CP04.ep1.8.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_id": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"product": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"product_id": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-beanutils@1.7.0-2jpp.ep1.5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"product": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.8.0-1.ep1.el4.noarch",
"product": {
"name": "javassist-0:3.8.0-1.ep1.el4.noarch",
"product_id": "javassist-0:3.8.0-1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.8.0-1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"product": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"product": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.1.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"product": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"product": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"product": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"product": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"product": {
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"product_id": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"product": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"product_id": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-1.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_id": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"product": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"product": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"product_id": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-4.GA_CP04.ep1.5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"product": {
"name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"product_id": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.2.0-4.GA_CP04.ep1.5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"product": {
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"product_id": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.2.0-3.GA_CP04.ep1.8.el4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.src"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch"
},
"product_reference": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src"
},
"product_reference": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
},
"product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src"
},
"product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.src"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch"
},
"product_reference": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src"
},
"product_reference": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
},
"product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src"
},
"product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5342",
"discovery_date": "2007-10-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427216"
}
],
"notes": [
{
"category": "description",
"text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Tomcat\u0027s default security policy is too open",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
],
"known_not_affected": [
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5342"
},
{
"category": "external",
"summary": "RHBZ#427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342"
}
],
"release_date": "2007-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T12:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0833"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Apache Tomcat\u0027s default security policy is too open"
},
{
"cve": "CVE-2008-3519",
"discovery_date": "2008-04-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458823"
}
],
"notes": [
{
"category": "description",
"text": "The default configuration of the JBossAs component in Red Hat JBoss Enterprise Application Platform (aka JBossEAP or EAP), possibly 4.2 before CP04 and 4.3 before CP02, when a production environment is enabled, sets the DownloadServerClasses property to true, which allows remote attackers to obtain sensitive information (non-EJB classes) via a download request, a different vulnerability than CVE-2008-3273.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBossEAP allows download of non-EJB class files",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
],
"known_not_affected": [
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3519"
},
{
"category": "external",
"summary": "RHBZ#458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3519",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3519"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519"
}
],
"release_date": "2008-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T12:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0833"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JBossEAP allows download of non-EJB class files"
}
]
}
RHSA-2008:0834
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.2 packages that fix\nvarious security issues are now available for Red Hat Enterprise Linux 5 as\nJBEAP 4.2.0.CP04.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 5 serves as a\nreplacement to JBEAP 4.2.0.CP03.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the release notes. The link to the release notes is available\nbelow in the References section.\n\nThe following security issues are also fixed with this release: \n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process. (CVE-2007-5342)\n\nThe property that controls the download of server classes was set to \"true\"\nin the \"production\" configuration. When the class download service is bound\nto an external interface, a remote attacker was able to download arbitrary\nclass files from the server class path. (CVE-2008-3519)\n \nWarning: before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.2 on Red Hat Enterprise Linux 5 are advised to upgrade\nto these updated packages, which resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0834",
"url": "https://access.redhat.com/errata/RHSA-2008:0834"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp04/html-single/readme/index.html",
"url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp04/html-single/readme/index.html"
},
{
"category": "external",
"summary": "427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "458711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458711"
},
{
"category": "external",
"summary": "458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0834.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0CP04 security update",
"tracking": {
"current_release_date": "2025-10-09T13:07:16+00:00",
"generator": {
"date": "2025-10-09T13:07:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2008:0834",
"initial_release_date": "2008-09-22T13:15:00+00:00",
"revision_history": [
{
"date": "2008-09-22T13:15:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-09-22T09:15:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T13:07:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"product": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"product": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.2.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src",
"product": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src",
"product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el5.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"product": {
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"product_id": "javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.8.0-1jpp.ep1.2.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"product": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el5.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"product": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"product": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"product": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"product": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"product": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"product": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"product": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"product": {
"name": "jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"product_id": "jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.9.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"product": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"product_id": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-4.GA_CP04.ep1.3.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"product": {
"name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"product_id": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.2.0-4.GA_CP04.ep1.7.el5.6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"product": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.2.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"product": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"product": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.2.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"product": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"product": {
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"product_id": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.8.0-1jpp.ep1.2.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"product": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"product": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"product": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"product": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_id": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_id": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.2.1-2.GA_CP03.1jpp.ep1.9.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP04.0jpp.ep1.3.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"product": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"product_id": "jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-1.ep1.9.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"product": {
"name": "jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"product_id": "jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.9.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"product": {
"name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"product_id": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.2.0-4.GA_CP04.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"product": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"product_id": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-4.GA_CP04.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"product": {
"name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"product_id": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.2.0-4.GA_CP04.ep1.7.el5.6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"product": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.2.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch"
},
"product_reference": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.src"
},
"product_reference": "javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.9.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.src"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch"
},
"product_reference": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src"
},
"product_reference": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch"
},
"product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src"
},
"product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5342",
"discovery_date": "2007-10-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427216"
}
],
"notes": [
{
"category": "description",
"text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Tomcat\u0027s default security policy is too open",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch"
],
"known_not_affected": [
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5342"
},
{
"category": "external",
"summary": "RHBZ#427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342"
}
],
"release_date": "2007-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T13:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0834"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Apache Tomcat\u0027s default security policy is too open"
},
{
"cve": "CVE-2008-3519",
"discovery_date": "2008-04-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458823"
}
],
"notes": [
{
"category": "description",
"text": "The default configuration of the JBossAs component in Red Hat JBoss Enterprise Application Platform (aka JBossEAP or EAP), possibly 4.2 before CP04 and 4.3 before CP02, when a production environment is enabled, sets the DownloadServerClasses property to true, which allows remote attackers to obtain sensitive information (non-EJB classes) via a download request, a different vulnerability than CVE-2008-3273.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBossEAP allows download of non-EJB class files",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch"
],
"known_not_affected": [
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3519"
},
{
"category": "external",
"summary": "RHBZ#458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3519",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3519"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519"
}
],
"release_date": "2008-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T13:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0834"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JBossEAP allows download of non-EJB class files"
}
]
}
rhsa-2008_0831
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix\nvarious security issues are now available for Red Hat Enterprise Linux 4 as\nJBEAP 4.3.0.CP02.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 4 serves as a\nreplacement to JBEAP 4.3.0.CP01.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the release notes. The link to the release notes is available\nbelow in the References section.\n\nThe following security issues are also fixed with this release: \n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process. (CVE-2007-5342)\n\nThe property that controls the download of server classes was set to \"true\"\nin the \"production\" configuration. When the class download service is bound\nto an external interface, a remote attacker was able to download arbitrary\nclass files from the server class path. (CVE-2008-3519)\n\nWarning: before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.3 on Red Hat Enterprise Linux 4 are advised to upgrade\nto these updated packages, which resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0831",
"url": "https://access.redhat.com/errata/RHSA-2008:0831"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.3.0.cp02/html-single/readme/index.html",
"url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.3.0.cp02/html-single/readme/index.html"
},
{
"category": "external",
"summary": "427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "456975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=456975"
},
{
"category": "external",
"summary": "458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0831.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0CP02 security update",
"tracking": {
"current_release_date": "2024-11-22T02:14:03+00:00",
"generator": {
"date": "2024-11-22T02:14:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2008:0831",
"initial_release_date": "2008-09-22T13:02:00+00:00",
"revision_history": [
{
"date": "2008-09-22T13:02:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-09-22T09:02:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T02:14:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"product": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"product_id": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-beanutils@1.7.0-2jpp.ep1.5.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"product": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"product": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.8.0-1.ep1.el4.src",
"product": {
"name": "javassist-0:3.8.0-1.ep1.el4.src",
"product_id": "javassist-0:3.8.0-1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.8.0-1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"product": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"product": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.1.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"product": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"product": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"product": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"product_id": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-common@1.0.0-1.GA_CP01.0jpp.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"product": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"product_id": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-0jpp.ep1.11.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"product": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"product": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"product": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"product_id": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxws@2.1.1-1jpp.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"product": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"product_id": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1jpp.ep1.2.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"product": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"product": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"product": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"product": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"product_id": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-1.SP3_CP03.0jpp.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"product": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"product_id": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws@2.0.1-2.SP2_CP03.0jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"product": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"product_id": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.3.0-2.GA_CP02.ep1.10.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"product": {
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"product_id": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-3.GA_CP02.ep1.9.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"product": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"product_id": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-beanutils@1.7.0-2jpp.ep1.5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_id": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"product": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.8.0-1.ep1.el4.noarch",
"product": {
"name": "javassist-0:3.8.0-1.ep1.el4.noarch",
"product_id": "javassist-0:3.8.0-1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.8.0-1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"product": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"product": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.1.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"product": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"product": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"product": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"product_id": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-common@1.0.0-1.GA_CP01.0jpp.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"product": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"product_id": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-0jpp.ep1.11.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"product": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"product": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"product": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"product_id": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxws@2.1.1-1jpp.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"product": {
"name": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"product_id": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-javadoc@2.1.4-1jpp.ep1.2.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"product": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"product_id": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1jpp.ep1.2.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"product": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"product": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"product_id": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_id": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"product": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"product": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"product_id": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-1.SP3_CP03.0jpp.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"product": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"product_id": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws@2.0.1-2.SP2_CP03.0jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"product": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"product_id": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.3.0-2.GA_CP02.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"product": {
"name": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"product_id": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.3.0-3.GA_CP02.ep1.9.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"product": {
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"product_id": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-3.GA_CP02.ep1.9.el4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch"
},
"product_reference": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch"
},
"product_reference": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src"
},
"product_reference": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src"
},
"product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch"
},
"product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src"
},
"product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src"
},
"product_reference": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src"
},
"product_reference": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch"
},
"product_reference": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src"
},
"product_reference": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
},
"product_reference": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src"
},
"product_reference": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch"
},
"product_reference": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch"
},
"product_reference": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src"
},
"product_reference": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src"
},
"product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch"
},
"product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src"
},
"product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src"
},
"product_reference": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src"
},
"product_reference": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch"
},
"product_reference": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src"
},
"product_reference": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
},
"product_reference": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src"
},
"product_reference": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5342",
"discovery_date": "2007-10-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427216"
}
],
"notes": [
{
"category": "description",
"text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Tomcat\u0027s default security policy is too open",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
],
"known_not_affected": [
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5342"
},
{
"category": "external",
"summary": "RHBZ#427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342"
}
],
"release_date": "2007-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T13:02:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0831"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Apache Tomcat\u0027s default security policy is too open"
},
{
"cve": "CVE-2008-3519",
"discovery_date": "2008-04-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458823"
}
],
"notes": [
{
"category": "description",
"text": "The default configuration of the JBossAs component in Red Hat JBoss Enterprise Application Platform (aka JBossEAP or EAP), possibly 4.2 before CP04 and 4.3 before CP02, when a production environment is enabled, sets the DownloadServerClasses property to true, which allows remote attackers to obtain sensitive information (non-EJB classes) via a download request, a different vulnerability than CVE-2008-3273.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBossEAP allows download of non-EJB class files",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
],
"known_not_affected": [
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3519"
},
{
"category": "external",
"summary": "RHBZ#458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3519",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3519"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519"
}
],
"release_date": "2008-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T13:02:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0831"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JBossEAP allows download of non-EJB class files"
}
]
}
rhsa-2008:0834
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.2 packages that fix\nvarious security issues are now available for Red Hat Enterprise Linux 5 as\nJBEAP 4.2.0.CP04.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 5 serves as a\nreplacement to JBEAP 4.2.0.CP03.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the release notes. The link to the release notes is available\nbelow in the References section.\n\nThe following security issues are also fixed with this release: \n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process. (CVE-2007-5342)\n\nThe property that controls the download of server classes was set to \"true\"\nin the \"production\" configuration. When the class download service is bound\nto an external interface, a remote attacker was able to download arbitrary\nclass files from the server class path. (CVE-2008-3519)\n \nWarning: before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.2 on Red Hat Enterprise Linux 5 are advised to upgrade\nto these updated packages, which resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0834",
"url": "https://access.redhat.com/errata/RHSA-2008:0834"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp04/html-single/readme/index.html",
"url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp04/html-single/readme/index.html"
},
{
"category": "external",
"summary": "427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "458711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458711"
},
{
"category": "external",
"summary": "458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0834.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0CP04 security update",
"tracking": {
"current_release_date": "2025-10-09T13:07:16+00:00",
"generator": {
"date": "2025-10-09T13:07:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2008:0834",
"initial_release_date": "2008-09-22T13:15:00+00:00",
"revision_history": [
{
"date": "2008-09-22T13:15:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-09-22T09:15:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T13:07:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"product": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"product": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.2.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src",
"product": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src",
"product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el5.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"product": {
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"product_id": "javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.8.0-1jpp.ep1.2.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"product": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el5.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"product": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"product": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"product": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"product": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"product": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"product": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"product": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"product": {
"name": "jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"product_id": "jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.9.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"product": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"product_id": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-4.GA_CP04.ep1.3.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"product": {
"name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"product_id": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.2.0-4.GA_CP04.ep1.7.el5.6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"product": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.2.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"product": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"product": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.2.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"product": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"product": {
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"product_id": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.8.0-1jpp.ep1.2.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"product": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"product": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"product": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"product": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_id": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_id": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.2.1-2.GA_CP03.1jpp.ep1.9.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP04.0jpp.ep1.3.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"product": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"product_id": "jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-1.ep1.9.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"product": {
"name": "jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"product_id": "jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.9.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"product": {
"name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"product_id": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.2.0-4.GA_CP04.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"product": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"product_id": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-4.GA_CP04.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"product": {
"name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"product_id": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.2.0-4.GA_CP04.ep1.7.el5.6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"product": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.2.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch"
},
"product_reference": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.src"
},
"product_reference": "javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.9.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.src"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch"
},
"product_reference": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src"
},
"product_reference": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch"
},
"product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src"
},
"product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5342",
"discovery_date": "2007-10-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427216"
}
],
"notes": [
{
"category": "description",
"text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Tomcat\u0027s default security policy is too open",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch"
],
"known_not_affected": [
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5342"
},
{
"category": "external",
"summary": "RHBZ#427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342"
}
],
"release_date": "2007-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T13:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0834"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Apache Tomcat\u0027s default security policy is too open"
},
{
"cve": "CVE-2008-3519",
"discovery_date": "2008-04-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458823"
}
],
"notes": [
{
"category": "description",
"text": "The default configuration of the JBossAs component in Red Hat JBoss Enterprise Application Platform (aka JBossEAP or EAP), possibly 4.2 before CP04 and 4.3 before CP02, when a production environment is enabled, sets the DownloadServerClasses property to true, which allows remote attackers to obtain sensitive information (non-EJB classes) via a download request, a different vulnerability than CVE-2008-3273.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBossEAP allows download of non-EJB class files",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch"
],
"known_not_affected": [
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3519"
},
{
"category": "external",
"summary": "RHBZ#458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3519",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3519"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519"
}
],
"release_date": "2008-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T13:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0834"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JBossEAP allows download of non-EJB class files"
}
]
}
rhsa-2008_0834
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.2 packages that fix\nvarious security issues are now available for Red Hat Enterprise Linux 5 as\nJBEAP 4.2.0.CP04.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 5 serves as a\nreplacement to JBEAP 4.2.0.CP03.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the release notes. The link to the release notes is available\nbelow in the References section.\n\nThe following security issues are also fixed with this release: \n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process. (CVE-2007-5342)\n\nThe property that controls the download of server classes was set to \"true\"\nin the \"production\" configuration. When the class download service is bound\nto an external interface, a remote attacker was able to download arbitrary\nclass files from the server class path. (CVE-2008-3519)\n \nWarning: before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.2 on Red Hat Enterprise Linux 5 are advised to upgrade\nto these updated packages, which resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0834",
"url": "https://access.redhat.com/errata/RHSA-2008:0834"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp04/html-single/readme/index.html",
"url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp04/html-single/readme/index.html"
},
{
"category": "external",
"summary": "427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "458711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458711"
},
{
"category": "external",
"summary": "458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0834.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0CP04 security update",
"tracking": {
"current_release_date": "2024-11-22T02:13:26+00:00",
"generator": {
"date": "2024-11-22T02:13:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2008:0834",
"initial_release_date": "2008-09-22T13:15:00+00:00",
"revision_history": [
{
"date": "2008-09-22T13:15:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-09-22T09:15:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T02:13:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"product": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"product": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.2.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src",
"product": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src",
"product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el5.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"product": {
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"product_id": "javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.8.0-1jpp.ep1.2.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"product": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el5.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"product": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"product": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"product": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"product": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"product": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"product": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"product": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"product": {
"name": "jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"product_id": "jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.9.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"product": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"product_id": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-4.GA_CP04.ep1.3.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"product": {
"name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"product_id": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.2.0-4.GA_CP04.ep1.7.el5.6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"product": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.2.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"product": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"product": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.2.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"product": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"product": {
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"product_id": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.8.0-1jpp.ep1.2.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"product": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"product": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"product": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"product": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_id": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_id": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.2.1-2.GA_CP03.1jpp.ep1.9.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP04.0jpp.ep1.3.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"product": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"product_id": "jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-1.ep1.9.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"product": {
"name": "jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"product_id": "jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.9.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"product": {
"name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"product_id": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.2.0-4.GA_CP04.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"product": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"product_id": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-4.GA_CP04.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"product": {
"name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"product_id": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.2.0-4.GA_CP04.ep1.7.el5.6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"product": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.2.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch"
},
"product_reference": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.src"
},
"product_reference": "javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.9.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.src"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch"
},
"product_reference": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src"
},
"product_reference": "jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch"
},
"product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src"
},
"product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5342",
"discovery_date": "2007-10-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427216"
}
],
"notes": [
{
"category": "description",
"text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Tomcat\u0027s default security policy is too open",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch"
],
"known_not_affected": [
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5342"
},
{
"category": "external",
"summary": "RHBZ#427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342"
}
],
"release_date": "2007-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T13:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0834"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Apache Tomcat\u0027s default security policy is too open"
},
{
"cve": "CVE-2008-3519",
"discovery_date": "2008-04-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458823"
}
],
"notes": [
{
"category": "description",
"text": "The default configuration of the JBossAs component in Red Hat JBoss Enterprise Application Platform (aka JBossEAP or EAP), possibly 4.2 before CP04 and 4.3 before CP02, when a production environment is enabled, sets the DownloadServerClasses property to true, which allows remote attackers to obtain sensitive information (non-EJB classes) via a download request, a different vulnerability than CVE-2008-3273.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBossEAP allows download of non-EJB class files",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch"
],
"known_not_affected": [
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.2.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.src",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:javassist-0:3.8.0-1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.src",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3519"
},
{
"category": "external",
"summary": "RHBZ#458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3519",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3519"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519"
}
],
"release_date": "2008-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T13:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.9.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.9.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-4.GA_CP04.ep1.7.el5.6.src",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.3.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0834"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JBossEAP allows download of non-EJB class files"
}
]
}
rhsa-2008_0832
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix\nvarious security issues are now available for Red Hat Enterprise Linux 5 as\nJBEAP 4.3.0.CP02.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 5 serves as a\nreplacement to JBEAP 4.3.0.CP01.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the release notes. The link to the release notes is available\nbelow in the References section.\n\nThe following security issues are also fixed with this release: \n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process. (CVE-2007-5342)\n\nThe property that controls the download of server classes was set to \"true\"\nin the \"production\" configuration. When the class download service is bound\nto an external interface, a remote attacker was able to download arbitrary\nclass files from the server class path. (CVE-2008-3519)\n\nWarning: before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.3 on Red Hat Enterprise Linux 5 are advised to upgrade\nto these updated packages, which resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0832",
"url": "https://access.redhat.com/errata/RHSA-2008:0832"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.3.0.cp02/html-single/readme/index.html",
"url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.3.0.cp02/html-single/readme/index.html"
},
{
"category": "external",
"summary": "427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "458713",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458713"
},
{
"category": "external",
"summary": "458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0832.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0CP02 security update",
"tracking": {
"current_release_date": "2024-11-22T02:13:18+00:00",
"generator": {
"date": "2024-11-22T02:13:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2008:0832",
"initial_release_date": "2008-09-22T13:27:00+00:00",
"revision_history": [
{
"date": "2008-09-22T13:27:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-09-22T09:27:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T02:13:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"product": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"product": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.2.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"product": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"product": {
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"product_id": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.8.0-1jpp.ep1.2.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"product": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"product": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"product": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"product": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"product_id": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-1.SP3_CP03.0jpp.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"product": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"product": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"product_id": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-common@1.0.0-1.GA_CP01.0jpp.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_id": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"product": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"product_id": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-0jpp.ep1.11.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_id": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.2.1-2.GA_CP03.1jpp.ep1.9.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP04.0jpp.ep1.3.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"product": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"product_id": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxws@2.1.1-1jpp.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch",
"product": {
"name": "rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch",
"product_id": "rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-2.GA_CP02.ep1.6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"product": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"product_id": "glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1jpp.ep1.4.el5.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"product": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"product_id": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws@2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"product": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"product_id": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.3.0-2.GA_CP02.ep1.10.el5.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"product": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"product_id": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"product": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"product": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.2.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"product": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"product_id": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-1.SP3_CP03.0jpp.ep1.3.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"product": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"product_id": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.3.0-2.GA_CP02.ep1.10.el5.2?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"product": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch"
},
"product_reference": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch"
},
"product_reference": "javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch"
},
"product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src"
},
"product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch"
},
"product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src"
},
"product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch"
},
"product_reference": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch"
},
"product_reference": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch"
},
"product_reference": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch"
},
"product_reference": "rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5342",
"discovery_date": "2007-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427216"
}
],
"notes": [
{
"category": "description",
"text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Tomcat\u0027s default security policy is too open",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"5Server-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5342"
},
{
"category": "external",
"summary": "RHBZ#427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342"
}
],
"release_date": "2007-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T13:27:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"5Server-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0832"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Apache Tomcat\u0027s default security policy is too open"
},
{
"cve": "CVE-2008-3519",
"discovery_date": "2008-04-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458823"
}
],
"notes": [
{
"category": "description",
"text": "The default configuration of the JBossAs component in Red Hat JBoss Enterprise Application Platform (aka JBossEAP or EAP), possibly 4.2 before CP04 and 4.3 before CP02, when a production environment is enabled, sets the DownloadServerClasses property to true, which allows remote attackers to obtain sensitive information (non-EJB classes) via a download request, a different vulnerability than CVE-2008-3273.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBossEAP allows download of non-EJB class files",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"5Server-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3519"
},
{
"category": "external",
"summary": "RHBZ#458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3519",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3519"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519"
}
],
"release_date": "2008-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T13:27:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Server-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.4.el5.2.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:javassist-0:3.8.0-1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el5.2.src",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el5.1.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el5.noarch",
"5Server-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-2.GA_CP02.ep1.6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0832"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JBossEAP allows download of non-EJB class files"
}
]
}
rhsa-2008_0833
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.2 packages that fix\nvarious security issues are now available for Red Hat Enterprise Linux 4 as\nJBEAP 4.2.0.CP04.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 4 serves as a\nreplacement to JBEAP 4.2.0.CP03.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the release notes. The link to the release notes is available\nbelow in the References section.\n\nThe following security issues are also fixed with this release: \n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process. (CVE-2007-5342)\n\nThe property that controls the download of server classes was set to \"true\"\nin the \"production\" configuration. When the class download service is bound\nto an external interface, a remote attacker was able to download arbitrary\nclass files from the server class path. (CVE-2008-3519)\n\nWarning: before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.2 on Red Hat Enterprise Linux 4 are advised to upgrade\nto these updated packages, which resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0833",
"url": "https://access.redhat.com/errata/RHSA-2008:0833"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp04/html-single/readme/index.html",
"url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp04/html-single/readme/index.html"
},
{
"category": "external",
"summary": "427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "456973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=456973"
},
{
"category": "external",
"summary": "458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0833.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0CP04 security update",
"tracking": {
"current_release_date": "2024-11-22T02:13:22+00:00",
"generator": {
"date": "2024-11-22T02:13:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2008:0833",
"initial_release_date": "2008-09-22T12:50:00+00:00",
"revision_history": [
{
"date": "2008-09-22T12:50:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-09-22T08:50:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T02:13:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"product": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"product": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"product_id": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-beanutils@1.7.0-2jpp.ep1.5.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"product": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.8.0-1.ep1.el4.src",
"product": {
"name": "javassist-0:3.8.0-1.ep1.el4.src",
"product_id": "javassist-0:3.8.0-1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.8.0-1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"product": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"product": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.1.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"product": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"product": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"product": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"product": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"product": {
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"product_id": "jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.10.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"product": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"product": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"product": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"product_id": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-4.GA_CP04.ep1.5.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"product": {
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"product_id": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.2.0-3.GA_CP04.ep1.8.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_id": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"product": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"product_id": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-beanutils@1.7.0-2jpp.ep1.5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"product": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.8.0-1.ep1.el4.noarch",
"product": {
"name": "javassist-0:3.8.0-1.ep1.el4.noarch",
"product_id": "javassist-0:3.8.0-1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.8.0-1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"product": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"product": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.1.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"product": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"product": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"product": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"product": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"product": {
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"product_id": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"product": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"product_id": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-1.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_id": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"product": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"product": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"product_id": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-4.GA_CP04.ep1.5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"product": {
"name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"product_id": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.2.0-4.GA_CP04.ep1.5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"product": {
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"product_id": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.2.0-3.GA_CP04.ep1.8.el4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.src"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch"
},
"product_reference": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src"
},
"product_reference": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
},
"product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src"
},
"product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.src"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch"
},
"product_reference": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src"
},
"product_reference": "jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
},
"product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src"
},
"product_reference": "rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5342",
"discovery_date": "2007-10-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427216"
}
],
"notes": [
{
"category": "description",
"text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Tomcat\u0027s default security policy is too open",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
],
"known_not_affected": [
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5342"
},
{
"category": "external",
"summary": "RHBZ#427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342"
}
],
"release_date": "2007-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T12:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0833"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Apache Tomcat\u0027s default security policy is too open"
},
{
"cve": "CVE-2008-3519",
"discovery_date": "2008-04-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458823"
}
],
"notes": [
{
"category": "description",
"text": "The default configuration of the JBossAs component in Red Hat JBoss Enterprise Application Platform (aka JBossEAP or EAP), possibly 4.2 before CP04 and 4.3 before CP02, when a production environment is enabled, sets the DownloadServerClasses property to true, which allows remote attackers to obtain sensitive information (non-EJB classes) via a download request, a different vulnerability than CVE-2008-3273.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBossEAP allows download of non-EJB class files",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
],
"known_not_affected": [
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3519"
},
{
"category": "external",
"summary": "RHBZ#458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3519",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3519"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519"
}
],
"release_date": "2008-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T12:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.10.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.10.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-3.GA_CP04.ep1.8.el4.src",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-4.GA_CP04.ep1.5.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-4.GA_CP04.ep1.5.el4.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0833"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JBossEAP allows download of non-EJB class files"
}
]
}
rhsa-2008_0195
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat packages that fix multiple security issues are now available\nfor Red Hat Developer Suite 3.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Tomcat is a servlet container for Java Servlet and Java Server Pages\ntechnologies.\n\nTomcat was found treating single quote characters -- \u0027 -- as delimiters in\ncookies. This could allow remote attackers to obtain sensitive information,\nsuch as session IDs, for session hijacking attacks (CVE-2007-3382).\n\nIt was reported Tomcat did not properly handle the following character\nsequence in a cookie: \\\" (a backslash followed by a double-quote). It was\npossible remote attackers could use this failure to obtain sensitive\ninformation, such as session IDs, for session hijacking attacks\n(CVE-2007-3385).\n\nA directory traversal vulnerability existed in the Apache Tomcat webdav\nservlet. This allowed remote attackers to remote authenticated users to\nread accessible to the local user running the tomcat process (CVE-2007-5461).\n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process (CVE-2007-5342).\n\nUsers of Tomcat should update to these erratum packages, which contain\nbackported patches and are not vulnerable to these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0195",
"url": "https://access.redhat.com/errata/RHSA-2008:0195"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "247972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247972"
},
{
"category": "external",
"summary": "247976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247976"
},
{
"category": "external",
"summary": "333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0195.json"
}
],
"title": "Red Hat Security Advisory: tomcat security update",
"tracking": {
"current_release_date": "2024-11-22T02:13:32+00:00",
"generator": {
"date": "2024-11-22T02:13:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2008:0195",
"initial_release_date": "2008-04-28T09:15:00+00:00",
"revision_history": [
{
"date": "2008-04-28T09:15:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-04-28T05:16:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T02:13:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Developer Suite v.3 (AS v.4)",
"product": {
"name": "Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_developer_suite:3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Developer Suite v.3"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_11rh.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_11rh.src",
"product_id": "tomcat5-0:5.5.23-0jpp_11rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_11rh?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_11rh.noarch",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_11rh.noarch",
"product_id": "tomcat5-0:5.5.23-0jpp_11rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_11rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_11rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_11rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_11rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_11rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_11rh?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_11rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_11rh.src as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_11rh.src",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch",
"relates_to_product_reference": "4AS-DS3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-3382",
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "247972"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (\"\u0027\") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat handling of cookies",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3382"
},
{
"category": "external",
"summary": "RHBZ#247972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247972"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3382",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3382"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3382",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3382"
}
],
"release_date": "2007-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-04-28T09:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0195"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat handling of cookies"
},
{
"cve": "CVE-2007-3385",
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "247976"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \\\" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat handling of cookie values",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3385"
},
{
"category": "external",
"summary": "RHBZ#247976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247976"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3385",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3385"
}
],
"release_date": "2007-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-04-28T09:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0195"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat handling of cookie values"
},
{
"cve": "CVE-2007-5342",
"discovery_date": "2007-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427216"
}
],
"notes": [
{
"category": "description",
"text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Tomcat\u0027s default security policy is too open",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5342"
},
{
"category": "external",
"summary": "RHBZ#427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342"
}
],
"release_date": "2007-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-04-28T09:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0195"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Apache Tomcat\u0027s default security policy is too open"
},
{
"cve": "CVE-2007-5461",
"discovery_date": "2007-10-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "333791"
}
],
"notes": [
{
"category": "description",
"text": "Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Absolute path traversal Apache Tomcat WEBDAV",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5461"
},
{
"category": "external",
"summary": "RHBZ#333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461"
}
],
"release_date": "2007-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-04-28T09:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_11rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_11rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_11rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0195"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Absolute path traversal Apache Tomcat WEBDAV"
}
]
}
rhsa-2008:0831
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix\nvarious security issues are now available for Red Hat Enterprise Linux 4 as\nJBEAP 4.3.0.CP02.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 4 serves as a\nreplacement to JBEAP 4.3.0.CP01.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the release notes. The link to the release notes is available\nbelow in the References section.\n\nThe following security issues are also fixed with this release: \n\nThe default security policy in the JULI logging component did not restrict\naccess permissions to files. This could be misused by untrusted web\napplications to access and write arbitrary files in the context of the\ntomcat process. (CVE-2007-5342)\n\nThe property that controls the download of server classes was set to \"true\"\nin the \"production\" configuration. When the class download service is bound\nto an external interface, a remote attacker was able to download arbitrary\nclass files from the server class path. (CVE-2008-3519)\n\nWarning: before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.3 on Red Hat Enterprise Linux 4 are advised to upgrade\nto these updated packages, which resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0831",
"url": "https://access.redhat.com/errata/RHSA-2008:0831"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.3.0.cp02/html-single/readme/index.html",
"url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.3.0.cp02/html-single/readme/index.html"
},
{
"category": "external",
"summary": "427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "456975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=456975"
},
{
"category": "external",
"summary": "458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0831.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0CP02 security update",
"tracking": {
"current_release_date": "2025-10-09T13:07:14+00:00",
"generator": {
"date": "2025-10-09T13:07:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2008:0831",
"initial_release_date": "2008-09-22T13:02:00+00:00",
"revision_history": [
{
"date": "2008-09-22T13:02:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-09-22T09:02:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T13:07:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"product": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"product_id": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-beanutils@1.7.0-2jpp.ep1.5.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"product": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"product": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.8.0-1.ep1.el4.src",
"product": {
"name": "javassist-0:3.8.0-1.ep1.el4.src",
"product_id": "javassist-0:3.8.0-1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.8.0-1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"product": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"product": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.1.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"product": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"product": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"product": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"product_id": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-common@1.0.0-1.GA_CP01.0jpp.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"product": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"product_id": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-0jpp.ep1.11.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"product": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"product": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"product": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"product_id": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxws@2.1.1-1jpp.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"product": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"product_id": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1jpp.ep1.2.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"product": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"product": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"product": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"product": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"product_id": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-1.SP3_CP03.0jpp.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"product": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"product_id": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws@2.0.1-2.SP2_CP03.0jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"product": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"product_id": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.3.0-2.GA_CP02.ep1.10.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"product": {
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"product_id": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-3.GA_CP02.ep1.9.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"product": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"product_id": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-beanutils@1.7.0-2jpp.ep1.5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_id": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_id": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.2.1-2.GA_CP03.1jpp.ep1.9.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_id": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"product": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"product_id": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.8.0-1.ep1.el4.noarch",
"product": {
"name": "javassist-0:3.8.0-1.ep1.el4.noarch",
"product_id": "javassist-0:3.8.0-1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.8.0-1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"product": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"product_id": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_id": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"product": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"product_id": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"product_id": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP02.1jpp.ep1.1.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"product": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"product_id": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"product": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"product_id": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"product": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"product_id": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-common@1.0.0-1.GA_CP01.0jpp.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"product": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"product_id": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-0jpp.ep1.11.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"product": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"product_id": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"product": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"product_id": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"product": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"product_id": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxws@2.1.1-1jpp.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"product": {
"name": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"product_id": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-javadoc@2.1.4-1jpp.ep1.2.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"product": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"product_id": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1jpp.ep1.2.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"product": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"product": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"product_id": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP04.0jpp.ep1.3.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_id": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_id": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"product": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"product_id": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"product": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"product_id": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-1.SP3_CP03.0jpp.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"product": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"product_id": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws@2.0.1-2.SP2_CP03.0jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"product": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"product_id": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.3.0-2.GA_CP02.ep1.10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"product": {
"name": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"product_id": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.3.0-3.GA_CP02.ep1.9.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"product": {
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"product_id": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-3.GA_CP02.ep1.9.el4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch"
},
"product_reference": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch"
},
"product_reference": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src"
},
"product_reference": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src"
},
"product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch"
},
"product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src"
},
"product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src"
},
"product_reference": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src"
},
"product_reference": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch"
},
"product_reference": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src"
},
"product_reference": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
},
"product_reference": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src"
},
"product_reference": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src"
},
"product_reference": "glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch"
},
"product_reference": "glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch"
},
"product_reference": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src"
},
"product_reference": "glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src"
},
"product_reference": "glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src"
},
"product_reference": "hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src"
},
"product_reference": "hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src"
},
"product_reference": "jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.8.0-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src"
},
"product_reference": "javassist-0:3.8.0-1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src"
},
"product_reference": "jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src"
},
"product_reference": "jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src"
},
"product_reference": "jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src"
},
"product_reference": "jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch"
},
"product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src"
},
"product_reference": "jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src"
},
"product_reference": "jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src"
},
"product_reference": "jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch"
},
"product_reference": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src"
},
"product_reference": "jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
},
"product_reference": "jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
},
"product_reference": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src"
},
"product_reference": "rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5342",
"discovery_date": "2007-10-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427216"
}
],
"notes": [
{
"category": "description",
"text": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Tomcat\u0027s default security policy is too open",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
],
"known_not_affected": [
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5342"
},
{
"category": "external",
"summary": "RHBZ#427216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342"
}
],
"release_date": "2007-12-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T13:02:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0831"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Apache Tomcat\u0027s default security policy is too open"
},
{
"cve": "CVE-2008-3519",
"discovery_date": "2008-04-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458823"
}
],
"notes": [
{
"category": "description",
"text": "The default configuration of the JBossAs component in Red Hat JBoss Enterprise Application Platform (aka JBossEAP or EAP), possibly 4.2 before CP04 and 4.3 before CP02, when a production environment is enabled, sets the DownloadServerClasses property to true, which allows remote attackers to obtain sensitive information (non-EJB classes) via a download request, a different vulnerability than CVE-2008-3273.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBossEAP allows download of non-EJB class files",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
],
"known_not_affected": [
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaf-0:1.1.0-0jpp.ep1.12.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jstl-0:1.2.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-commons-annotations-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.2.1-2.GA_CP03.1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-beanutils-0:1.7.0-2jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-jaxr-0:1.2.0-SP1.0jpp.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossxb-0:1.0.0-2.SP3.0jpp.ep1.3.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3519"
},
{
"category": "external",
"summary": "RHBZ#458823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3519",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3519"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3519"
}
],
"release_date": "2008-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-09-22T13:02:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.0-0jpp.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxws-0:2.1.1-1jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.2.1-4.GA_CP02.1jpp.ep1.7.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP04.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-validator-0:0.0.0-1.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:javassist-0:3.8.0-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-2.CP02.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-1.SP3_CP03.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.2-3.SP9.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-2.GA_CP02.ep1.10.el4.src",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP02.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-4.CP06.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-2.SP2_CP03.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-1.GA_CP01.0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-0jpp.ep1.11.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-3.GA_CP02.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-3.GA_CP02.ep1.9.el4.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0831"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JBossEAP allows download of non-EJB class files"
}
]
}
gsd-2007-5342
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2007-5342",
"description": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"id": "GSD-2007-5342",
"references": [
"https://www.suse.com/security/cve/CVE-2007-5342.html",
"https://www.debian.org/security/2008/dsa-1447",
"https://access.redhat.com/errata/RHSA-2008:0862",
"https://access.redhat.com/errata/RHSA-2008:0834",
"https://access.redhat.com/errata/RHSA-2008:0833",
"https://access.redhat.com/errata/RHSA-2008:0832",
"https://access.redhat.com/errata/RHSA-2008:0831",
"https://access.redhat.com/errata/RHSA-2008:0195",
"https://access.redhat.com/errata/RHSA-2008:0042",
"https://linux.oracle.com/cve/CVE-2007-5342.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2007-5342"
],
"details": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.",
"id": "GSD-2007-5342",
"modified": "2023-12-13T01:21:40.418310Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-5342",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://secunia.com/advisories/37460",
"refsource": "MISC",
"url": "http://secunia.com/advisories/37460"
},
{
"name": "http://tomcat.apache.org/security-5.html",
"refsource": "MISC",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"name": "http://tomcat.apache.org/security-6.html",
"refsource": "MISC",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "http://www.securityfocus.com/archive/1/507985/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
"refsource": "MISC",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "http://www.vupen.com/english/advisories/2009/3316",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"name": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html",
"refsource": "MISC",
"url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2"
},
{
"name": "http://osvdb.org/39833",
"refsource": "MISC",
"url": "http://osvdb.org/39833"
},
{
"name": "http://secunia.com/advisories/28274",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28274"
},
{
"name": "http://secunia.com/advisories/28317",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28317"
},
{
"name": "http://secunia.com/advisories/28915",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28915"
},
{
"name": "http://secunia.com/advisories/29313",
"refsource": "MISC",
"url": "http://secunia.com/advisories/29313"
},
{
"name": "http://secunia.com/advisories/29711",
"refsource": "MISC",
"url": "http://secunia.com/advisories/29711"
},
{
"name": "http://secunia.com/advisories/30676",
"refsource": "MISC",
"url": "http://secunia.com/advisories/30676"
},
{
"name": "http://secunia.com/advisories/32120",
"refsource": "MISC",
"url": "http://secunia.com/advisories/32120"
},
{
"name": "http://secunia.com/advisories/32222",
"refsource": "MISC",
"url": "http://secunia.com/advisories/32222"
},
{
"name": "http://secunia.com/advisories/32266",
"refsource": "MISC",
"url": "http://secunia.com/advisories/32266"
},
{
"name": "http://secunia.com/advisories/57126",
"refsource": "MISC",
"url": "http://secunia.com/advisories/57126"
},
{
"name": "http://security.gentoo.org/glsa/glsa-200804-10.xml",
"refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-200804-10.xml"
},
{
"name": "http://securityreason.com/securityalert/3485",
"refsource": "MISC",
"url": "http://securityreason.com/securityalert/3485"
},
{
"name": "http://support.apple.com/kb/HT3216",
"refsource": "MISC",
"url": "http://support.apple.com/kb/HT3216"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm",
"refsource": "MISC",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm"
},
{
"name": "http://svn.apache.org/viewvc?view=rev\u0026revision=606594",
"refsource": "MISC",
"url": "http://svn.apache.org/viewvc?view=rev\u0026revision=606594"
},
{
"name": "http://www.debian.org/security/2008/dsa-1447",
"refsource": "MISC",
"url": "http://www.debian.org/security/2008/dsa-1447"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2008-0042.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0042.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2008-0195.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2008-0831.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0831.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2008-0832.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0832.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2008-0833.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0833.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2008-0834.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0834.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2008-0862.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0862.html"
},
{
"name": "http://www.securityfocus.com/archive/1/485481/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/485481/100/0/threaded"
},
{
"name": "http://www.securityfocus.com/bid/27006",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/27006"
},
{
"name": "http://www.securityfocus.com/bid/31681",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/31681"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html",
"refsource": "MISC",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html"
},
{
"name": "http://www.vupen.com/english/advisories/2008/0013",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2008/0013"
},
{
"name": "http://www.vupen.com/english/advisories/2008/1856/references",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2008/1856/references"
},
{
"name": "http://www.vupen.com/english/advisories/2008/2780",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2008/2780"
},
{
"name": "http://www.vupen.com/english/advisories/2008/2823",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2008/2823"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39201",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39201"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-5342"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://svn.apache.org/viewvc?view=rev\u0026revision=606594",
"refsource": "MISC",
"tags": [],
"url": "http://svn.apache.org/viewvc?view=rev\u0026revision=606594"
},
{
"name": "http://tomcat.apache.org/security-5.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://tomcat.apache.org/security-5.html"
},
{
"name": "http://tomcat.apache.org/security-6.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "27006",
"refsource": "BID",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/27006"
},
{
"name": "DSA-1447",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2008/dsa-1447"
},
{
"name": "28274",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28274"
},
{
"name": "28317",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28317"
},
{
"name": "3485",
"refsource": "SREASON",
"tags": [],
"url": "http://securityreason.com/securityalert/3485"
},
{
"name": "FEDORA-2008-1467",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html"
},
{
"name": "FEDORA-2008-1603",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html"
},
{
"name": "28915",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28915"
},
{
"name": "RHSA-2008:0042",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0042.html"
},
{
"name": "29313",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/29313"
},
{
"name": "GLSA-200804-10",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-200804-10.xml"
},
{
"name": "29711",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/29711"
},
{
"name": "RHSA-2008:0195",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html"
},
{
"name": "30676",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/30676"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html"
},
{
"name": "MDVSA-2008:188",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188"
},
{
"name": "RHSA-2008:0862",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0862.html"
},
{
"name": "31681",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/31681"
},
{
"name": "APPLE-SA-2008-10-09",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
},
{
"name": "32222",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/32222"
},
{
"name": "http://support.apple.com/kb/HT3216",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT3216"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm"
},
{
"name": "39833",
"refsource": "OSVDB",
"tags": [],
"url": "http://osvdb.org/39833"
},
{
"name": "32120",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/32120"
},
{
"name": "SUSE-SR:2009:004",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name": "32266",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/32266"
},
{
"name": "RHSA-2008:0831",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0831.html"
},
{
"name": "RHSA-2008:0833",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0833.html"
},
{
"name": "RHSA-2008:0834",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0834.html"
},
{
"name": "RHSA-2008:0832",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0832.html"
},
{
"name": "ADV-2009-3316",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "37460",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/37460"
},
{
"name": "ADV-2008-2823",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/2823"
},
{
"name": "ADV-2008-1856",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/1856/references"
},
{
"name": "ADV-2008-0013",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/0013"
},
{
"name": "ADV-2008-2780",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/2780"
},
{
"name": "HPSBST02955",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2"
},
{
"name": "57126",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/57126"
},
{
"name": "apache-juli-logging-weak-security(39201)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39201"
},
{
"name": "oval:org.mitre.oval:def:10417",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417"
},
{
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "20071223 [CVE-2007-5342] Apache Tomcat\u0027s default security policy is too open",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/485481/100/0/threaded"
},
{
"name": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T02:18Z",
"publishedDate": "2007-12-27T22:46Z"
}
}
}
CERTA-2009-AVI-513
Vulnerability from certfr_avis
Plusieurs vulnérabilités découvertes dans les produits VMware peuvent être exploitées à distance par un utilisateur malintentionné afin de compromettre le système vulnérable ou encore d'entraver son bon fonctionnement.
Description
Les vulnérabilités présentes dans les produits VMware peuvent être exploitées afin de porter atteinte à l'intégrité et à la confidentialité des données, de réaliser un déni de service, d'injecter et d'exécuter indirectement du code arbitraire, d'élever ses privilèges ou d'exécuter du code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | VMware Server 2.x ; | ||
| VMware | ESXi | VMware ESXi 3.x ; | ||
| VMware | N/A | VMware vMA 4.x. | ||
| VMware | N/A | VMware ESX Server 4.x ; | ||
| VMware | N/A | VMware ESX Server 2.x ; | ||
| VMware | N/A | VMware ESX Server 3.x ; | ||
| VMware | ESXi | VMware ESXi 4.x ; | ||
| VMware | vCenter Server | VMware vCenter Server 4.x ; | ||
| VMware | N/A | VMware VirtualCenter 2.x ; |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware Server 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi 3.x ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vMA 4.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 4.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 3.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi 4.x ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCenter Server 4.x ;",
"product": {
"name": "vCenter Server",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware VirtualCenter 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLes vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans les produits VMware peuvent \u00eatre\nexploit\u00e9es afin de porter atteinte \u00e0 l\u0027int\u00e9grit\u00e9 et \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, de r\u00e9aliser un d\u00e9ni de service, d\u0027injecter et d\u0027ex\u00e9cuter\nindirectement du code arbitraire, d\u0027\u00e9lever ses privil\u00e8ges ou d\u0027ex\u00e9cuter\ndu code arbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2724",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2724"
},
{
"name": "CVE-2009-0676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0676"
},
{
"name": "CVE-2009-2721",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2721"
},
{
"name": "CVE-2008-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3143"
},
{
"name": "CVE-2009-2692",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2692"
},
{
"name": "CVE-2009-2406",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2406"
},
{
"name": "CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
},
{
"name": "CVE-2008-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0002"
},
{
"name": "CVE-2009-1106",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1106"
},
{
"name": "CVE-2009-1072",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1072"
},
{
"name": "CVE-2008-4307",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4307"
},
{
"name": "CVE-2009-1104",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1104"
},
{
"name": "CVE-2009-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2407"
},
{
"name": "CVE-2008-3142",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3142"
},
{
"name": "CVE-2009-1101",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1101"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2009-1385",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
},
{
"name": "CVE-2009-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0746"
},
{
"name": "CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"name": "CVE-2007-5966",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
},
{
"name": "CVE-2009-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2719"
},
{
"name": "CVE-2008-4864",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4864"
},
{
"name": "CVE-2009-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2417"
},
{
"name": "CVE-2009-1439",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1439"
},
{
"name": "CVE-2009-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0322"
},
{
"name": "CVE-2009-1895",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
},
{
"name": "CVE-2009-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1094"
},
{
"name": "CVE-2009-0748",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0748"
},
{
"name": "CVE-2008-3144",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3144"
},
{
"name": "CVE-2009-0747",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0747"
},
{
"name": "CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"name": "CVE-2009-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1095"
},
{
"name": "CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"name": "CVE-2009-0675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0675"
},
{
"name": "CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"name": "CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"name": "CVE-2009-1102",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1102"
},
{
"name": "CVE-2009-1630",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1630"
},
{
"name": "CVE-2009-0269",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0269"
},
{
"name": "CVE-2008-3528",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3528"
},
{
"name": "CVE-2008-5031",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5031"
},
{
"name": "CVE-2008-1721",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1721"
},
{
"name": "CVE-2009-1388",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1388"
},
{
"name": "CVE-2009-1192",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1192"
},
{
"name": "CVE-2009-2720",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2720"
},
{
"name": "CVE-2009-0834",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
},
{
"name": "CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"name": "CVE-2009-2848",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2848"
},
{
"name": "CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"name": "CVE-2008-1232",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1232"
},
{
"name": "CVE-2009-0159",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0159"
},
{
"name": "CVE-2009-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0778"
},
{
"name": "CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"name": "CVE-2009-1099",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1099"
},
{
"name": "CVE-2009-1252",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1252"
},
{
"name": "CVE-2009-2698",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2698"
},
{
"name": "CVE-2008-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2370"
},
{
"name": "CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"name": "CVE-2009-2723",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2723"
},
{
"name": "CVE-2009-1107",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1107"
},
{
"name": "CVE-2009-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2716"
},
{
"name": "CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"name": "CVE-2008-1947",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1947"
},
{
"name": "CVE-2009-1105",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1105"
},
{
"name": "CVE-2007-6286",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6286"
},
{
"name": "CVE-2009-0028",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0028"
},
{
"name": "CVE-2009-1337",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1337"
},
{
"name": "CVE-2009-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2007-2052",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2052"
},
{
"name": "CVE-2009-1336",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1336"
},
{
"name": "CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"name": "CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"name": "CVE-2007-4965",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4965"
},
{
"name": "CVE-2009-1633",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1633"
},
{
"name": "CVE-2009-2722",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2722"
},
{
"name": "CVE-2008-5700",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5700"
},
{
"name": "CVE-2009-1103",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1103"
},
{
"name": "CVE-2009-1100",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1100"
},
{
"name": "CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"name": "CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"name": "CVE-2009-1096",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1096"
},
{
"name": "CVE-2009-1098",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1098"
},
{
"name": "CVE-2009-0787",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0787"
},
{
"name": "CVE-2008-1887",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1887"
},
{
"name": "CVE-2009-1097",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1097"
},
{
"name": "CVE-2009-2847",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2847"
},
{
"name": "CVE-2008-2315",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2315"
},
{
"name": "CVE-2009-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0696"
},
{
"name": "CVE-2009-2718",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2718"
},
{
"name": "CVE-2009-0745",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0745"
},
{
"name": "CVE-2009-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1093"
}
],
"initial_release_date": "2009-11-24T00:00:00",
"last_revision_date": "2009-11-24T00:00:00",
"links": [],
"reference": "CERTA-2009-AVI-513",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-11-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans les produits VMware peuvent\n\u00eatre exploit\u00e9es \u00e0 distance par un utilisateur malintentionn\u00e9 afin de\ncompromettre le syst\u00e8me vuln\u00e9rable ou encore d\u0027entraver son bon\nfonctionnement.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware du 20 novembre 2009",
"url": "http://lists.vmware.com/pipermail/security-announce/2009/000070.html"
}
]
}
CERTFR-2014-AVI-089
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans HP XP P9000 Performance Advisor Software. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
HP XP P9000 Performance Advisor Software versions 5.4.1 et antérieures
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eHP XP P9000 Performance Advisor Software versions 5.4.1 et ant\u00e9rieures\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-5062",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5062"
},
{
"name": "CVE-2011-2729",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2729"
},
{
"name": "CVE-2010-4172",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4172"
},
{
"name": "CVE-2011-3190",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3190"
},
{
"name": "CVE-2011-0534",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0534"
},
{
"name": "CVE-2008-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0002"
},
{
"name": "CVE-2009-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2901"
},
{
"name": "CVE-2011-0013",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0013"
},
{
"name": "CVE-2013-0366",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0366"
},
{
"name": "CVE-2013-0381",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0381"
},
{
"name": "CVE-2009-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
},
{
"name": "CVE-2011-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5063"
},
{
"name": "CVE-2009-2902",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
},
{
"name": "CVE-2012-4431",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4431"
},
{
"name": "CVE-2013-0354",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0354"
},
{
"name": "CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"name": "CVE-2010-2227",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
},
{
"name": "CVE-2008-1232",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1232"
},
{
"name": "CVE-2011-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1184"
},
{
"name": "CVE-2013-0372",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0372"
},
{
"name": "CVE-2011-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2526"
},
{
"name": "CVE-2013-0363",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0363"
},
{
"name": "CVE-2009-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3548"
},
{
"name": "CVE-2008-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2370"
},
{
"name": "CVE-2013-0364",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0364"
},
{
"name": "CVE-2012-3546",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3546"
},
{
"name": "CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"name": "CVE-2012-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3219"
},
{
"name": "CVE-2008-1947",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1947"
},
{
"name": "CVE-2012-4534",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4534"
},
{
"name": "CVE-2013-0352",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0352"
},
{
"name": "CVE-2013-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0397"
},
{
"name": "CVE-2007-6286",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6286"
},
{
"name": "CVE-2013-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0361"
},
{
"name": "CVE-2011-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5064"
},
{
"name": "CVE-2010-3718",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3718"
},
{
"name": "CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"name": "CVE-2012-3190",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3190"
},
{
"name": "CVE-2011-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2481"
},
{
"name": "CVE-2011-5035",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5035"
},
{
"name": "CVE-2011-2204",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2204"
},
{
"name": "CVE-2010-1157",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1157"
},
{
"name": "CVE-2012-2733",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2733"
}
],
"initial_release_date": "2014-02-25T00:00:00",
"last_revision_date": "2014-02-25T00:00:00",
"links": [],
"reference": "CERTFR-2014-AVI-089",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-02-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eHP XP P9000 Performance Advisor Software\u003c/span\u003e.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et un contournement de\nla politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans HP XP P9000 Performance Advisor Software",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 HP c04047415 du 25 f\u00e9vrier 2014",
"url": "http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c04047415-1"
}
]
}
CERTA-2008-AVI-492
Vulnerability from certfr_avis
Plusieurs vulnérabilités affectant Apple Mac Os X permettent à une personne malveillante d'effectuer une exécution de code arbitraire, de provoquer un déni de service à distance, de contourner la politique de sécurité, de porter atteinte à la confidentialité des données et d'élever ses privilèges sur le système.
Description
De multiples vulnérabilités ont été découvertes dans Apple Mac OS X. Ces dernières affectent entre autres :
- ColorSync ;
- CUPS ;
- Finder ;
- Postfix ;
- Networking ;
- ...
Elles permettent à une personne malintentionnée d'effectuer une exécution de code arbitraire , de provoquer un déni de service à distance, de contourner la politique de sécurité, de porter atteinte à la confidentialité des données et d'élever ses privilèges sur le système.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X 10.4.11 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X 10.5.5.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Apple Mac OS X. Ces\nderni\u00e8res affectent entre autres :\n\n- ColorSync ;\n- CUPS ;\n- Finder ;\n- Postfix ;\n- Networking ;\n- ...\n\nElles permettent \u00e0 une personne malintentionn\u00e9e d\u0027effectuer une\nex\u00e9cution de code arbitraire , de provoquer un d\u00e9ni de service \u00e0\ndistance, de contourner la politique de s\u00e9curit\u00e9, de porter atteinte \u00e0\nla confidentialit\u00e9 des donn\u00e9es et d\u0027\u00e9lever ses privil\u00e8ges sur le\nsyst\u00e8me.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-1678",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1678"
},
{
"name": "CVE-2008-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3643"
},
{
"name": "CVE-2008-0226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0226"
},
{
"name": "CVE-2008-3642",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3642"
},
{
"name": "CVE-2008-4212",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4212"
},
{
"name": "CVE-2008-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0002"
},
{
"name": "CVE-2008-4215",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4215"
},
{
"name": "CVE-2007-6420",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6420"
},
{
"name": "CVE-2008-2371",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2371"
},
{
"name": "CVE-2008-0674",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0674"
},
{
"name": "CVE-2007-5969",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5969"
},
{
"name": "CVE-2008-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3646"
},
{
"name": "CVE-2008-3912",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3912"
},
{
"name": "CVE-2008-3914",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3914"
},
{
"name": "CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"name": "CVE-2008-3432",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3432"
},
{
"name": "CVE-2008-2079",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2079"
},
{
"name": "CVE-2008-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1389"
},
{
"name": "CVE-2008-1232",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1232"
},
{
"name": "CVE-2008-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2370"
},
{
"name": "CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"name": "CVE-2008-2712",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2712"
},
{
"name": "CVE-2008-1947",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1947"
},
{
"name": "CVE-2007-4850",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4850"
},
{
"name": "CVE-2007-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2691"
},
{
"name": "CVE-2007-6286",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6286"
},
{
"name": "CVE-2008-3641",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3641"
},
{
"name": "CVE-2008-3913",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3913"
},
{
"name": "CVE-2008-3294",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3294"
},
{
"name": "CVE-2008-3645",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3645"
},
{
"name": "CVE-2008-3647",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3647"
},
{
"name": "CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"name": "CVE-2008-2364",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2364"
},
{
"name": "CVE-2008-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4214"
},
{
"name": "CVE-2008-1767",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1767"
},
{
"name": "CVE-2008-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2938"
},
{
"name": "CVE-2008-0227",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0227"
},
{
"name": "CVE-2008-4101",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4101"
},
{
"name": "CVE-2008-4211",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4211"
}
],
"initial_release_date": "2008-10-13T00:00:00",
"last_revision_date": "2008-10-13T00:00:00",
"links": [],
"reference": "CERTA-2008-AVI-492",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s affectant Apple Mac Os X permettent \u00e0 une\npersonne malveillante d\u0027effectuer une ex\u00e9cution de code arbitraire, de\nprovoquer un d\u00e9ni de service \u00e0 distance, de contourner la politique de\ns\u00e9curit\u00e9, de porter atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et\nd\u0027\u00e9lever ses privil\u00e8ges sur le syst\u00e8me.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT3216 du 09 octobre 2008",
"url": "http://support.apple.com/kb/HT3216"
}
]
}
CERTA-2007-AVI-569
Vulnerability from certfr_avis
Une vulnérabilité dans Apache Tomcat permet à un utilisateur malveillant d'élever ses privilèges.
Description
Le composant JULI (Java Util Logging Interface) de Tomcat autorise les applications web à fournir leurs propres configurations de journalisation. La politique de sécurité par défaut est trop laxiste vis-à-vis de ces configurations. Cette vulnérabilité permet à une application qui n'est pas de confiance de modifier ou d'ajouter des fichiers avec les droits du processus Tomcat.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Tomcat, versions 6.0.x et 5.5.x.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eTomcat, versions 6.0.x et 5.5.x.\u003c/p\u003e",
"content": "## Description\n\nLe composant JULI (Java Util Logging Interface) de Tomcat autorise les\napplications web \u00e0 fournir leurs propres configurations de\njournalisation. La politique de s\u00e9curit\u00e9 par d\u00e9faut est trop laxiste\nvis-\u00e0-vis de ces configurations. Cette vuln\u00e9rabilit\u00e9 permet \u00e0 une\napplication qui n\u0027est pas de confiance de modifier ou d\u0027ajouter des\nfichiers avec les droits du processus Tomcat.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
}
],
"initial_release_date": "2007-12-28T00:00:00",
"last_revision_date": "2007-12-28T00:00:00",
"links": [
{
"title": "Bulletins de s\u00e9curit\u00e9 Apache Tomcat :",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 Apache Tomcat :",
"url": "http://tomcat.apache.org/security-6.html"
}
],
"reference": "CERTA-2007-AVI-569",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-12-28T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans Apache Tomcat permet \u00e0 un utilisateur malveillant\nd\u0027\u00e9lever ses privil\u00e8ges.\n",
"title": "Vuln\u00e9rabilit\u00e9 de Tomcat",
"vendor_advisories": [
{
"published_at": null,
"title": "CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
}
]
}
fkie_cve-2007-5342
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html | ||
| secalert@redhat.com | http://marc.info/?l=bugtraq&m=139344343412337&w=2 | ||
| secalert@redhat.com | http://osvdb.org/39833 | ||
| secalert@redhat.com | http://secunia.com/advisories/28274 | ||
| secalert@redhat.com | http://secunia.com/advisories/28317 | ||
| secalert@redhat.com | http://secunia.com/advisories/28915 | ||
| secalert@redhat.com | http://secunia.com/advisories/29313 | ||
| secalert@redhat.com | http://secunia.com/advisories/29711 | ||
| secalert@redhat.com | http://secunia.com/advisories/30676 | ||
| secalert@redhat.com | http://secunia.com/advisories/32120 | ||
| secalert@redhat.com | http://secunia.com/advisories/32222 | ||
| secalert@redhat.com | http://secunia.com/advisories/32266 | ||
| secalert@redhat.com | http://secunia.com/advisories/37460 | ||
| secalert@redhat.com | http://secunia.com/advisories/57126 | ||
| secalert@redhat.com | http://security.gentoo.org/glsa/glsa-200804-10.xml | ||
| secalert@redhat.com | http://securityreason.com/securityalert/3485 | ||
| secalert@redhat.com | http://support.apple.com/kb/HT3216 | ||
| secalert@redhat.com | http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm | ||
| secalert@redhat.com | http://svn.apache.org/viewvc?view=rev&revision=606594 | ||
| secalert@redhat.com | http://tomcat.apache.org/security-5.html | ||
| secalert@redhat.com | http://tomcat.apache.org/security-6.html | ||
| secalert@redhat.com | http://www.debian.org/security/2008/dsa-1447 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2008:188 | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2008-0042.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2008-0195.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2008-0831.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2008-0832.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2008-0833.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2008-0834.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2008-0862.html | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/485481/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/507985/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/27006 | Patch | |
| secalert@redhat.com | http://www.securityfocus.com/bid/31681 | ||
| secalert@redhat.com | http://www.vmware.com/security/advisories/VMSA-2008-0010.html | ||
| secalert@redhat.com | http://www.vmware.com/security/advisories/VMSA-2009-0016.html | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2008/0013 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2008/1856/references | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2008/2780 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2008/2823 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2009/3316 | ||
| secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/39201 | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417 | ||
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html | ||
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=139344343412337&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/39833 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28274 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28317 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28915 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29313 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29711 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30676 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32120 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32222 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32266 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37460 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/57126 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200804-10.xml | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/3485 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3216 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/viewvc?view=rev&revision=606594 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://tomcat.apache.org/security-5.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://tomcat.apache.org/security-6.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1447 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:188 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0042.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0195.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0831.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0832.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0833.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0834.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0862.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/485481/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/507985/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/27006 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/31681 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2008-0010.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2009-0016.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/0013 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1856/references | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2780 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2823 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/3316 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/39201 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html |
| Vendor | Product | Version | |
|---|---|---|---|
| apache | tomcat | 5.5.9 | |
| apache | tomcat | 5.5.10 | |
| apache | tomcat | 5.5.11 | |
| apache | tomcat | 5.5.12 | |
| apache | tomcat | 5.5.13 | |
| apache | tomcat | 5.5.14 | |
| apache | tomcat | 5.5.15 | |
| apache | tomcat | 5.5.16 | |
| apache | tomcat | 5.5.17 | |
| apache | tomcat | 5.5.18 | |
| apache | tomcat | 5.5.19 | |
| apache | tomcat | 5.5.20 | |
| apache | tomcat | 5.5.21 | |
| apache | tomcat | 5.5.22 | |
| apache | tomcat | 5.5.23 | |
| apache | tomcat | 5.5.24 | |
| apache | tomcat | 5.5.25 | |
| apache | tomcat | 6.0 | |
| apache | tomcat | 6.0.1 | |
| apache | tomcat | 6.0.2 | |
| apache | tomcat | 6.0.3 | |
| apache | tomcat | 6.0.4 | |
| apache | tomcat | 6.0.5 | |
| apache | tomcat | 6.0.6 | |
| apache | tomcat | 6.0.7 | |
| apache | tomcat | 6.0.8 | |
| apache | tomcat | 6.0.9 | |
| apache | tomcat | 6.0.10 | |
| apache | tomcat | 6.0.11 | |
| apache | tomcat | 6.0.12 | |
| apache | tomcat | 6.0.13 | |
| apache | tomcat | 6.0.14 | |
| apache | tomcat | 6.0.15 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C01D5-773F-469C-9E69-170C2844AAA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "EB03FDFB-4DBF-4B70-BFA3-570D1DE67695",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9F5CF79C-759B-4FF9-90EE-847264059E93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "357651FD-392E-4775-BF20-37A23B3ABAE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "585B9476-6B86-4809-9B9E-26112114CB59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*",
"matchCriteriaId": "6145036D-4FCE-4EBE-A137-BDFA69BA54F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E437055A-0A81-413F-AB08-0E9D0DC9EA30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9276A093-9C98-4617-9941-2276995F5848",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "97C9C36C-EF7E-4D42-9749-E2FF6CE35A2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*",
"matchCriteriaId": "C98575E2-E39A-4A8F-B5B5-BD280B8367BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*",
"matchCriteriaId": "5BDA08E7-A417-44E8-9C89-EB22BEEC3B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD1B6BE-CF07-4DA8-A703-4A48506C8AD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*",
"matchCriteriaId": "5878E08E-2741-4798-94E9-BA8E07386B12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*",
"matchCriteriaId": "69F6BAB7-C099-4345-A632-7287AEA555B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*",
"matchCriteriaId": "F3AAF031-D16B-4D51-9581-2D1376A5157B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*",
"matchCriteriaId": "51120689-F5C0-4DF1-91AA-314C40A46C58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*",
"matchCriteriaId": "F67477AB-85F6-421C-9C0B-C8EFB1B200CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D11D6FB7-CBDB-48C1-98CB-1B3CAA36C5D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F28C7801-41B9-4552-BA1E-577967BCBBEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "25B21085-7259-4685-9D1F-FF98E6489E10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "635EE321-2A1F-4FF8-95BE-0C26591969D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9A81B035-8598-4D2C-B45F-C6C9D4B10C2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E1096947-82A6-4EA8-A4F2-00D91E3F7DAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0EBFA1D3-16A6-4041-BB30-51D2EE0F2AF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B70B372F-EFFD-4AF7-99B5-7D1B23A0C54C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "9C95ADA4-66F5-45C4-A677-ACE22367A75A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "11951A10-39A2-4FF5-8C43-DF94730FB794",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "351E5BCF-A56B-4D91-BA3C-21A4B77D529A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2DC2BBB4-171E-4EFF-A575-A5B7FF031755",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6B6B0504-27C1-4824-A928-A878CBBAB32D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "CE81AD36-ACD1-4C6C-8E7C-5326D1DA3045",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "D903956B-14F5-4177-AF12-0A5F1846D3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "81F847DC-A2F5-456C-9038-16A0E85F4C3B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler."
},
{
"lang": "es",
"value": "La catalina.policy por defecto en el componente de acceso JULI de Apache Tomcat 5.5.9 hasta 5.5.25 y 6.0.0 hasta 6.0.15 no restringe determinados permisos para aplicaciones web, lo cual permite a atacantes remotos modificar opciones de configuraci\u00f3n de acceso y sobrescribir ficheros de su elecci\u00f3n, como se demuestra cambiando los atributos (1) level, (2) directory, y (3) prefix en el gestor org.apache.juli.FileHandler."
}
],
"id": "CVE-2007-5342",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-12-27T22:46:00.000",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://osvdb.org/39833"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28274"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28317"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28915"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/29313"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/29711"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/30676"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/32120"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/32222"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/32266"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/37460"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/57126"
},
{
"source": "secalert@redhat.com",
"url": "http://security.gentoo.org/glsa/glsa-200804-10.xml"
},
{
"source": "secalert@redhat.com",
"url": "http://securityreason.com/securityalert/3485"
},
{
"source": "secalert@redhat.com",
"url": "http://support.apple.com/kb/HT3216"
},
{
"source": "secalert@redhat.com",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm"
},
{
"source": "secalert@redhat.com",
"url": "http://svn.apache.org/viewvc?view=rev\u0026revision=606594"
},
{
"source": "secalert@redhat.com",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"source": "secalert@redhat.com",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2008/dsa-1447"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0042.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0831.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0832.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0833.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0834.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0862.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/485481/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/27006"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/31681"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2008/0013"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2008/1856/references"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2008/2780"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2008/2823"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39201"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/39833"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28274"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28317"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28915"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/29313"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/29711"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/30676"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/32120"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/32222"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/32266"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/37460"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/57126"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200804-10.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/3485"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT3216"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://svn.apache.org/viewvc?view=rev\u0026revision=606594"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2008/dsa-1447"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0042.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0831.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0832.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0833.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0834.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0862.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/485481/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/27006"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/31681"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/0013"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/1856/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/2780"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/2823"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39201"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
ghsa-w65j-cmqc-37p2
Vulnerability from github
The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.tomcat:tomcat-juli"
},
"ranges": [
{
"events": [
{
"introduced": "5.5.9"
},
{
"last_affected": "5.5.25"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.tomcat:tomcat-juli"
},
"ranges": [
{
"events": [
{
"introduced": "6.0.0"
},
{
"last_affected": "6.0.15"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2007-5342"
],
"database_specific": {
"cwe_ids": [
"CWE-284"
],
"github_reviewed": true,
"github_reviewed_at": "2023-09-22T21:54:06Z",
"nvd_published_at": "2007-12-27T22:46:00Z",
"severity": "MODERATE"
},
"details": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the `org.apache.juli.FileHandler` handler.",
"id": "GHSA-w65j-cmqc-37p2",
"modified": "2023-09-22T21:54:06Z",
"published": "2022-05-01T18:32:22Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39201"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/tomcat/tree/main/java/org/apache/juli"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200804-10.xml"
},
{
"type": "WEB",
"url": "http://securityreason.com/securityalert/3485"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT3216"
},
{
"type": "WEB",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm"
},
{
"type": "WEB",
"url": "http://svn.apache.org/viewvc?view=rev\u0026revision=606594"
},
{
"type": "WEB",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"type": "WEB",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2008/dsa-1447"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0042.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0831.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0832.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0833.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0834.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0862.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/485481/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/27006"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/31681"
},
{
"type": "WEB",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html"
},
{
"type": "WEB",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "JULI logging component in Apache Tomcat does not restrict certain permissions for web applications"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.