rhea-2018_2189
Vulnerability from csaf_redhat
Published
2018-07-12 16:57
Modified
2024-11-15 00:33
Summary
Red Hat Enhancement Advisory: Red Hat JBoss Web Server 5.0.0 enhancement update
Notes
Topic
Updated Red Hat JBoss Web Server 5.0.0 packages are now available for Red
Hat Enterprise Linux 6.
Details
Red Hat JBoss Web Server is a fully integrated and certified set of
components for hosting Java web applications. It is comprised of the
Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat
Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and
the Tomcat Native library.
* This enhancement update adds the Red Hat JBoss Web Server 5.0.0
packages to Red Hat Enterprise Linux 6. These packages provide a
number of enhancements over the previous version of Red Hat JBoss Web
Server.
Refer to the Release Notes for information on the most significant bug
fixes, enhancements and component upgrades included in this release.
Users of Red Hat JBoss Web Server are advised to upgrade to these
updated packages, which add this enhancement.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Red Hat JBoss Web Server 5.0.0 packages are now available for Red\nHat Enterprise Linux 6.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of\ncomponents for hosting Java web applications. It is comprised of the\nApache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat\nConnector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and\nthe Tomcat Native library.\n\n* This enhancement update adds the Red Hat JBoss Web Server 5.0.0\npackages to Red Hat Enterprise Linux 6. These packages provide a\nnumber of enhancements over the previous version of Red Hat JBoss Web\nServer.\n\nRefer to the Release Notes for information on the most significant bug \nfixes, enhancements and component upgrades included in this release.\n\nUsers of Red Hat JBoss Web Server are advised to upgrade to these\nupdated packages, which add this enhancement.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHEA-2018:2189", "url": "https://access.redhat.com/errata/RHEA-2018:2189" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_web_server/5.0/html-single/red_hat_jboss_web_server_5.0_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_web_server/5.0/html-single/red_hat_jboss_web_server_5.0_release_notes/" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhea-2018_2189.json" } ], "title": "Red Hat Enhancement Advisory: Red Hat JBoss Web Server 5.0.0 enhancement update", "tracking": { "current_release_date": "2024-11-15T00:33:03+00:00", "generator": { "date": "2024-11-15T00:33:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHEA-2018:2189", "initial_release_date": "2018-07-12T16:57:25+00:00", "revision_history": [ { "date": "2018-07-12T16:57:25+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-07-12T16:57:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T00:33:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product": { "name": "Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.0::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" }, { "branches": [ { "category": "product_version", "name": "jws5-runtime-0:1-5.el6jws.x86_64", "product": { "name": "jws5-runtime-0:1-5.el6jws.x86_64", "product_id": "jws5-runtime-0:1-5.el6jws.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-runtime@1-5.el6jws?arch=x86_64" } } }, { "category": "product_version", "name": "jws5-0:1-5.el6jws.x86_64", "product": { "name": "jws5-0:1-5.el6jws.x86_64", "product_id": "jws5-0:1-5.el6jws.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5@1-5.el6jws?arch=x86_64" } } }, { "category": "product_version", "name": "jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.x86_64", "product": { "name": "jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.x86_64", "product_id": "jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.17-20.redhat_20.el6jws?arch=x86_64" } } }, { "category": "product_version", "name": "jws5-tomcat-native-debuginfo-0:1.2.17-20.redhat_20.el6jws.x86_64", "product": { "name": "jws5-tomcat-native-debuginfo-0:1.2.17-20.redhat_20.el6jws.x86_64", "product_id": "jws5-tomcat-native-debuginfo-0:1.2.17-20.redhat_20.el6jws.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-native-debuginfo@1.2.17-20.redhat_20.el6jws?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jws5-runtime-0:1-5.el6jws.i686", "product": { "name": "jws5-runtime-0:1-5.el6jws.i686", "product_id": "jws5-runtime-0:1-5.el6jws.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-runtime@1-5.el6jws?arch=i686" } } }, { "category": "product_version", "name": "jws5-0:1-5.el6jws.i686", "product": { "name": "jws5-0:1-5.el6jws.i686", "product_id": "jws5-0:1-5.el6jws.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5@1-5.el6jws?arch=i686" } } }, { "category": "product_version", "name": "jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.i686", "product": { "name": "jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.i686", "product_id": "jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.17-20.redhat_20.el6jws?arch=i686" } } }, { "category": "product_version", "name": "jws5-tomcat-native-debuginfo-0:1.2.17-20.redhat_20.el6jws.i686", "product": { "name": "jws5-tomcat-native-debuginfo-0:1.2.17-20.redhat_20.el6jws.i686", "product_id": "jws5-tomcat-native-debuginfo-0:1.2.17-20.redhat_20.el6jws.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-native-debuginfo@1.2.17-20.redhat_20.el6jws?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "jws5-0:1-5.el6jws.src", "product": { "name": "jws5-0:1-5.el6jws.src", "product_id": "jws5-0:1-5.el6jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5@1-5.el6jws?arch=src" } } }, { "category": "product_version", "name": "jws5-javapackages-tools-0:3.4.1-5.15.7.el6jws.src", "product": { "name": "jws5-javapackages-tools-0:3.4.1-5.15.7.el6jws.src", "product_id": "jws5-javapackages-tools-0:3.4.1-5.15.7.el6jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-javapackages-tools@3.4.1-5.15.7.el6jws?arch=src" } } }, { "category": "product_version", "name": "jws5-tomcat-vault-0:1.1.7-3.Final_redhat_1.1.el6jws.src", "product": { "name": "jws5-tomcat-vault-0:1.1.7-3.Final_redhat_1.1.el6jws.src", "product_id": "jws5-tomcat-vault-0:1.1.7-3.Final_redhat_1.1.el6jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-vault@1.1.7-3.Final_redhat_1.1.el6jws?arch=src" } } }, { "category": "product_version", "name": "jws5-mod_cluster-0:1.4.0-8.Final_redhat_1.1.el6jws.src", "product": { "name": "jws5-mod_cluster-0:1.4.0-8.Final_redhat_1.1.el6jws.src", "product_id": "jws5-mod_cluster-0:1.4.0-8.Final_redhat_1.1.el6jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-mod_cluster@1.4.0-8.Final_redhat_1.1.el6jws?arch=src" } } }, { "category": "product_version", "name": "jws5-ecj-0:4.6.1-5.redhat_1.1.el6jws.src", "product": { "name": "jws5-ecj-0:4.6.1-5.redhat_1.1.el6jws.src", "product_id": "jws5-ecj-0:4.6.1-5.redhat_1.1.el6jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-ecj@4.6.1-5.redhat_1.1.el6jws?arch=src" } } }, { "category": "product_version", "name": "jws5-jboss-logging-0:3.3.1-4.Final_redhat_1.1.el6jws.src", "product": { "name": "jws5-jboss-logging-0:3.3.1-4.Final_redhat_1.1.el6jws.src", "product_id": "jws5-jboss-logging-0:3.3.1-4.Final_redhat_1.1.el6jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-jboss-logging@3.3.1-4.Final_redhat_1.1.el6jws?arch=src" } } }, { "category": "product_version", "name": "jws5-tomcat-0:9.0.7-10.redhat_10.1.el6jws.src", "product": { "name": "jws5-tomcat-0:9.0.7-10.redhat_10.1.el6jws.src", "product_id": "jws5-tomcat-0:9.0.7-10.redhat_10.1.el6jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.7-10.redhat_10.1.el6jws?arch=src" } } }, { "category": "product_version", "name": "jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.src", "product": { "name": "jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.src", "product_id": "jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.17-20.redhat_20.el6jws?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jws5-python-javapackages-0:3.4.1-5.15.7.el6jws.noarch", "product": { "name": "jws5-python-javapackages-0:3.4.1-5.15.7.el6jws.noarch", "product_id": "jws5-python-javapackages-0:3.4.1-5.15.7.el6jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-python-javapackages@3.4.1-5.15.7.el6jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-javapackages-tools-0:3.4.1-5.15.7.el6jws.noarch", "product": { "name": "jws5-javapackages-tools-0:3.4.1-5.15.7.el6jws.noarch", "product_id": "jws5-javapackages-tools-0:3.4.1-5.15.7.el6jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-javapackages-tools@3.4.1-5.15.7.el6jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-vault-javadoc-0:1.1.7-3.Final_redhat_1.1.el6jws.noarch", "product": { "name": "jws5-tomcat-vault-javadoc-0:1.1.7-3.Final_redhat_1.1.el6jws.noarch", "product_id": "jws5-tomcat-vault-javadoc-0:1.1.7-3.Final_redhat_1.1.el6jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-vault-javadoc@1.1.7-3.Final_redhat_1.1.el6jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-vault-0:1.1.7-3.Final_redhat_1.1.el6jws.noarch", "product": { "name": "jws5-tomcat-vault-0:1.1.7-3.Final_redhat_1.1.el6jws.noarch", "product_id": "jws5-tomcat-vault-0:1.1.7-3.Final_redhat_1.1.el6jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-vault@1.1.7-3.Final_redhat_1.1.el6jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-mod_cluster-0:1.4.0-8.Final_redhat_1.1.el6jws.noarch", "product": { "name": "jws5-mod_cluster-0:1.4.0-8.Final_redhat_1.1.el6jws.noarch", "product_id": "jws5-mod_cluster-0:1.4.0-8.Final_redhat_1.1.el6jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-mod_cluster@1.4.0-8.Final_redhat_1.1.el6jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-mod_cluster-tomcat-0:1.4.0-8.Final_redhat_1.1.el6jws.noarch", "product": { "name": "jws5-mod_cluster-tomcat-0:1.4.0-8.Final_redhat_1.1.el6jws.noarch", "product_id": "jws5-mod_cluster-tomcat-0:1.4.0-8.Final_redhat_1.1.el6jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-mod_cluster-tomcat@1.4.0-8.Final_redhat_1.1.el6jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-ecj-0:4.6.1-5.redhat_1.1.el6jws.noarch", "product": { "name": "jws5-ecj-0:4.6.1-5.redhat_1.1.el6jws.noarch", "product_id": "jws5-ecj-0:4.6.1-5.redhat_1.1.el6jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-ecj@4.6.1-5.redhat_1.1.el6jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-jboss-logging-0:3.3.1-4.Final_redhat_1.1.el6jws.noarch", "product": { "name": "jws5-jboss-logging-0:3.3.1-4.Final_redhat_1.1.el6jws.noarch", "product_id": "jws5-jboss-logging-0:3.3.1-4.Final_redhat_1.1.el6jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-jboss-logging@3.3.1-4.Final_redhat_1.1.el6jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-javadoc-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product": { "name": "jws5-tomcat-javadoc-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product_id": "jws5-tomcat-javadoc-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-javadoc@9.0.7-10.redhat_10.1.el6jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-lib-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product": { "name": "jws5-tomcat-lib-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product_id": "jws5-tomcat-lib-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-lib@9.0.7-10.redhat_10.1.el6jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product": { "name": "jws5-tomcat-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product_id": "jws5-tomcat-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.7-10.redhat_10.1.el6jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-admin-webapps-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product": { "name": "jws5-tomcat-admin-webapps-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product_id": "jws5-tomcat-admin-webapps-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-admin-webapps@9.0.7-10.redhat_10.1.el6jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-docs-webapp-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product": { "name": "jws5-tomcat-docs-webapp-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product_id": "jws5-tomcat-docs-webapp-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-docs-webapp@9.0.7-10.redhat_10.1.el6jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-jsp-2.3-api-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product_id": "jws5-tomcat-jsp-2.3-api-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-jsp-2.3-api@9.0.7-10.redhat_10.1.el6jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-selinux-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product": { "name": "jws5-tomcat-selinux-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product_id": "jws5-tomcat-selinux-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-selinux@9.0.7-10.redhat_10.1.el6jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-el-3.0-api-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product": { "name": "jws5-tomcat-el-3.0-api-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product_id": "jws5-tomcat-el-3.0-api-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-el-3.0-api@9.0.7-10.redhat_10.1.el6jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-jsvc-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product": { "name": "jws5-tomcat-jsvc-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product_id": "jws5-tomcat-jsvc-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-jsvc@9.0.7-10.redhat_10.1.el6jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-servlet-4.0-api-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product_id": "jws5-tomcat-servlet-4.0-api-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-servlet-4.0-api@9.0.7-10.redhat_10.1.el6jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-webapps-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product": { "name": "jws5-tomcat-webapps-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product_id": "jws5-tomcat-webapps-0:9.0.7-10.redhat_10.1.el6jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-webapps@9.0.7-10.redhat_10.1.el6jws?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jws5-0:1-5.el6jws.i686 as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-0:1-5.el6jws.i686" }, "product_reference": "jws5-0:1-5.el6jws.i686", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-0:1-5.el6jws.src as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-0:1-5.el6jws.src" }, "product_reference": "jws5-0:1-5.el6jws.src", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-0:1-5.el6jws.x86_64 as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-0:1-5.el6jws.x86_64" }, "product_reference": "jws5-0:1-5.el6jws.x86_64", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-ecj-0:4.6.1-5.redhat_1.1.el6jws.noarch as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-ecj-0:4.6.1-5.redhat_1.1.el6jws.noarch" }, "product_reference": "jws5-ecj-0:4.6.1-5.redhat_1.1.el6jws.noarch", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-ecj-0:4.6.1-5.redhat_1.1.el6jws.src as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-ecj-0:4.6.1-5.redhat_1.1.el6jws.src" }, "product_reference": "jws5-ecj-0:4.6.1-5.redhat_1.1.el6jws.src", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-javapackages-tools-0:3.4.1-5.15.7.el6jws.noarch as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-javapackages-tools-0:3.4.1-5.15.7.el6jws.noarch" }, "product_reference": "jws5-javapackages-tools-0:3.4.1-5.15.7.el6jws.noarch", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-javapackages-tools-0:3.4.1-5.15.7.el6jws.src as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-javapackages-tools-0:3.4.1-5.15.7.el6jws.src" }, "product_reference": "jws5-javapackages-tools-0:3.4.1-5.15.7.el6jws.src", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-jboss-logging-0:3.3.1-4.Final_redhat_1.1.el6jws.noarch as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-jboss-logging-0:3.3.1-4.Final_redhat_1.1.el6jws.noarch" }, "product_reference": "jws5-jboss-logging-0:3.3.1-4.Final_redhat_1.1.el6jws.noarch", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-jboss-logging-0:3.3.1-4.Final_redhat_1.1.el6jws.src as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-jboss-logging-0:3.3.1-4.Final_redhat_1.1.el6jws.src" }, "product_reference": "jws5-jboss-logging-0:3.3.1-4.Final_redhat_1.1.el6jws.src", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-mod_cluster-0:1.4.0-8.Final_redhat_1.1.el6jws.noarch as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-mod_cluster-0:1.4.0-8.Final_redhat_1.1.el6jws.noarch" }, "product_reference": "jws5-mod_cluster-0:1.4.0-8.Final_redhat_1.1.el6jws.noarch", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-mod_cluster-0:1.4.0-8.Final_redhat_1.1.el6jws.src as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-mod_cluster-0:1.4.0-8.Final_redhat_1.1.el6jws.src" }, "product_reference": "jws5-mod_cluster-0:1.4.0-8.Final_redhat_1.1.el6jws.src", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-mod_cluster-tomcat-0:1.4.0-8.Final_redhat_1.1.el6jws.noarch as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-mod_cluster-tomcat-0:1.4.0-8.Final_redhat_1.1.el6jws.noarch" }, "product_reference": "jws5-mod_cluster-tomcat-0:1.4.0-8.Final_redhat_1.1.el6jws.noarch", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-python-javapackages-0:3.4.1-5.15.7.el6jws.noarch as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-python-javapackages-0:3.4.1-5.15.7.el6jws.noarch" }, "product_reference": "jws5-python-javapackages-0:3.4.1-5.15.7.el6jws.noarch", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-runtime-0:1-5.el6jws.i686 as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-runtime-0:1-5.el6jws.i686" }, "product_reference": "jws5-runtime-0:1-5.el6jws.i686", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-runtime-0:1-5.el6jws.x86_64 as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-runtime-0:1-5.el6jws.x86_64" }, "product_reference": "jws5-runtime-0:1-5.el6jws.x86_64", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.7-10.redhat_10.1.el6jws.noarch as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-tomcat-0:9.0.7-10.redhat_10.1.el6jws.noarch" }, "product_reference": "jws5-tomcat-0:9.0.7-10.redhat_10.1.el6jws.noarch", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.7-10.redhat_10.1.el6jws.src as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-tomcat-0:9.0.7-10.redhat_10.1.el6jws.src" }, "product_reference": "jws5-tomcat-0:9.0.7-10.redhat_10.1.el6jws.src", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-admin-webapps-0:9.0.7-10.redhat_10.1.el6jws.noarch as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-tomcat-admin-webapps-0:9.0.7-10.redhat_10.1.el6jws.noarch" }, "product_reference": "jws5-tomcat-admin-webapps-0:9.0.7-10.redhat_10.1.el6jws.noarch", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-docs-webapp-0:9.0.7-10.redhat_10.1.el6jws.noarch as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-tomcat-docs-webapp-0:9.0.7-10.redhat_10.1.el6jws.noarch" }, "product_reference": "jws5-tomcat-docs-webapp-0:9.0.7-10.redhat_10.1.el6jws.noarch", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-el-3.0-api-0:9.0.7-10.redhat_10.1.el6jws.noarch as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-tomcat-el-3.0-api-0:9.0.7-10.redhat_10.1.el6jws.noarch" }, "product_reference": "jws5-tomcat-el-3.0-api-0:9.0.7-10.redhat_10.1.el6jws.noarch", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-javadoc-0:9.0.7-10.redhat_10.1.el6jws.noarch as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-tomcat-javadoc-0:9.0.7-10.redhat_10.1.el6jws.noarch" }, "product_reference": "jws5-tomcat-javadoc-0:9.0.7-10.redhat_10.1.el6jws.noarch", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.7-10.redhat_10.1.el6jws.noarch as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-tomcat-jsp-2.3-api-0:9.0.7-10.redhat_10.1.el6jws.noarch" }, "product_reference": "jws5-tomcat-jsp-2.3-api-0:9.0.7-10.redhat_10.1.el6jws.noarch", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-jsvc-0:9.0.7-10.redhat_10.1.el6jws.noarch as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-tomcat-jsvc-0:9.0.7-10.redhat_10.1.el6jws.noarch" }, "product_reference": "jws5-tomcat-jsvc-0:9.0.7-10.redhat_10.1.el6jws.noarch", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-lib-0:9.0.7-10.redhat_10.1.el6jws.noarch as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-tomcat-lib-0:9.0.7-10.redhat_10.1.el6jws.noarch" }, "product_reference": "jws5-tomcat-lib-0:9.0.7-10.redhat_10.1.el6jws.noarch", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.i686 as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.i686" }, "product_reference": "jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.i686", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.src as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.src" }, "product_reference": "jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.src", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.x86_64 as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.x86_64" }, "product_reference": "jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.x86_64", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-native-debuginfo-0:1.2.17-20.redhat_20.el6jws.i686 as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-tomcat-native-debuginfo-0:1.2.17-20.redhat_20.el6jws.i686" }, "product_reference": "jws5-tomcat-native-debuginfo-0:1.2.17-20.redhat_20.el6jws.i686", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-native-debuginfo-0:1.2.17-20.redhat_20.el6jws.x86_64 as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-tomcat-native-debuginfo-0:1.2.17-20.redhat_20.el6jws.x86_64" }, "product_reference": "jws5-tomcat-native-debuginfo-0:1.2.17-20.redhat_20.el6jws.x86_64", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-selinux-0:9.0.7-10.redhat_10.1.el6jws.noarch as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-tomcat-selinux-0:9.0.7-10.redhat_10.1.el6jws.noarch" }, "product_reference": "jws5-tomcat-selinux-0:9.0.7-10.redhat_10.1.el6jws.noarch", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.7-10.redhat_10.1.el6jws.noarch as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-tomcat-servlet-4.0-api-0:9.0.7-10.redhat_10.1.el6jws.noarch" }, "product_reference": "jws5-tomcat-servlet-4.0-api-0:9.0.7-10.redhat_10.1.el6jws.noarch", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-vault-0:1.1.7-3.Final_redhat_1.1.el6jws.noarch as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-tomcat-vault-0:1.1.7-3.Final_redhat_1.1.el6jws.noarch" }, "product_reference": "jws5-tomcat-vault-0:1.1.7-3.Final_redhat_1.1.el6jws.noarch", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-vault-0:1.1.7-3.Final_redhat_1.1.el6jws.src as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-tomcat-vault-0:1.1.7-3.Final_redhat_1.1.el6jws.src" }, "product_reference": "jws5-tomcat-vault-0:1.1.7-3.Final_redhat_1.1.el6jws.src", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-vault-javadoc-0:1.1.7-3.Final_redhat_1.1.el6jws.noarch as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-tomcat-vault-javadoc-0:1.1.7-3.Final_redhat_1.1.el6jws.noarch" }, "product_reference": "jws5-tomcat-vault-javadoc-0:1.1.7-3.Final_redhat_1.1.el6jws.noarch", "relates_to_product_reference": "6Server-JWS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-webapps-0:9.0.7-10.redhat_10.1.el6jws.noarch as a component of Red Hat JBoss Web Server 5.0 for RHEL 6 Server", "product_id": "6Server-JWS-5.0:jws5-tomcat-webapps-0:9.0.7-10.redhat_10.1.el6jws.noarch" }, "product_reference": "jws5-tomcat-webapps-0:9.0.7-10.redhat_10.1.el6jws.noarch", "relates_to_product_reference": "6Server-JWS-5.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1336", "discovery_date": "2018-07-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1607591" } ], "notes": [ { "category": "description", "text": "An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.7, 8.5.0 to 8.5.30, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: A bug in the UTF-8 decoder can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Fuse 6.3 and 7 standalone distributions ship but do not use tomcat, and as such are not affected by this flaw; however, Fuse Integration Services 2.0 and Fuse 7 on OpenShift provide the affected artifacts via their respective maven repositories, and will provide fixes for this issue in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-5.0:jws5-0:1-5.el6jws.i686", "6Server-JWS-5.0:jws5-0:1-5.el6jws.src", "6Server-JWS-5.0:jws5-0:1-5.el6jws.x86_64", "6Server-JWS-5.0:jws5-ecj-0:4.6.1-5.redhat_1.1.el6jws.noarch", "6Server-JWS-5.0:jws5-ecj-0:4.6.1-5.redhat_1.1.el6jws.src", "6Server-JWS-5.0:jws5-javapackages-tools-0:3.4.1-5.15.7.el6jws.noarch", "6Server-JWS-5.0:jws5-javapackages-tools-0:3.4.1-5.15.7.el6jws.src", "6Server-JWS-5.0:jws5-jboss-logging-0:3.3.1-4.Final_redhat_1.1.el6jws.noarch", "6Server-JWS-5.0:jws5-jboss-logging-0:3.3.1-4.Final_redhat_1.1.el6jws.src", "6Server-JWS-5.0:jws5-mod_cluster-0:1.4.0-8.Final_redhat_1.1.el6jws.noarch", "6Server-JWS-5.0:jws5-mod_cluster-0:1.4.0-8.Final_redhat_1.1.el6jws.src", "6Server-JWS-5.0:jws5-mod_cluster-tomcat-0:1.4.0-8.Final_redhat_1.1.el6jws.noarch", "6Server-JWS-5.0:jws5-python-javapackages-0:3.4.1-5.15.7.el6jws.noarch", "6Server-JWS-5.0:jws5-runtime-0:1-5.el6jws.i686", "6Server-JWS-5.0:jws5-runtime-0:1-5.el6jws.x86_64", "6Server-JWS-5.0:jws5-tomcat-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-0:9.0.7-10.redhat_10.1.el6jws.src", "6Server-JWS-5.0:jws5-tomcat-admin-webapps-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-docs-webapp-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-el-3.0-api-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-javadoc-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-jsp-2.3-api-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-jsvc-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-lib-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.i686", "6Server-JWS-5.0:jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.src", "6Server-JWS-5.0:jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.x86_64", "6Server-JWS-5.0:jws5-tomcat-native-debuginfo-0:1.2.17-20.redhat_20.el6jws.i686", "6Server-JWS-5.0:jws5-tomcat-native-debuginfo-0:1.2.17-20.redhat_20.el6jws.x86_64", "6Server-JWS-5.0:jws5-tomcat-selinux-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-servlet-4.0-api-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-vault-0:1.1.7-3.Final_redhat_1.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-vault-0:1.1.7-3.Final_redhat_1.1.el6jws.src", "6Server-JWS-5.0:jws5-tomcat-vault-javadoc-0:1.1.7-3.Final_redhat_1.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-webapps-0:9.0.7-10.redhat_10.1.el6jws.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1336" }, { "category": "external", "summary": "RHBZ#1607591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607591" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1336", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1336" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1336", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1336" } ], "release_date": "2018-07-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:57:25+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JWS-5.0:jws5-0:1-5.el6jws.i686", "6Server-JWS-5.0:jws5-0:1-5.el6jws.src", "6Server-JWS-5.0:jws5-0:1-5.el6jws.x86_64", "6Server-JWS-5.0:jws5-ecj-0:4.6.1-5.redhat_1.1.el6jws.noarch", "6Server-JWS-5.0:jws5-ecj-0:4.6.1-5.redhat_1.1.el6jws.src", "6Server-JWS-5.0:jws5-javapackages-tools-0:3.4.1-5.15.7.el6jws.noarch", "6Server-JWS-5.0:jws5-javapackages-tools-0:3.4.1-5.15.7.el6jws.src", "6Server-JWS-5.0:jws5-jboss-logging-0:3.3.1-4.Final_redhat_1.1.el6jws.noarch", "6Server-JWS-5.0:jws5-jboss-logging-0:3.3.1-4.Final_redhat_1.1.el6jws.src", "6Server-JWS-5.0:jws5-mod_cluster-0:1.4.0-8.Final_redhat_1.1.el6jws.noarch", "6Server-JWS-5.0:jws5-mod_cluster-0:1.4.0-8.Final_redhat_1.1.el6jws.src", "6Server-JWS-5.0:jws5-mod_cluster-tomcat-0:1.4.0-8.Final_redhat_1.1.el6jws.noarch", "6Server-JWS-5.0:jws5-python-javapackages-0:3.4.1-5.15.7.el6jws.noarch", "6Server-JWS-5.0:jws5-runtime-0:1-5.el6jws.i686", "6Server-JWS-5.0:jws5-runtime-0:1-5.el6jws.x86_64", "6Server-JWS-5.0:jws5-tomcat-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-0:9.0.7-10.redhat_10.1.el6jws.src", "6Server-JWS-5.0:jws5-tomcat-admin-webapps-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-docs-webapp-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-el-3.0-api-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-javadoc-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-jsp-2.3-api-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-jsvc-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-lib-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.i686", "6Server-JWS-5.0:jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.src", "6Server-JWS-5.0:jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.x86_64", "6Server-JWS-5.0:jws5-tomcat-native-debuginfo-0:1.2.17-20.redhat_20.el6jws.i686", "6Server-JWS-5.0:jws5-tomcat-native-debuginfo-0:1.2.17-20.redhat_20.el6jws.x86_64", "6Server-JWS-5.0:jws5-tomcat-selinux-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-servlet-4.0-api-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-vault-0:1.1.7-3.Final_redhat_1.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-vault-0:1.1.7-3.Final_redhat_1.1.el6jws.src", "6Server-JWS-5.0:jws5-tomcat-vault-javadoc-0:1.1.7-3.Final_redhat_1.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-webapps-0:9.0.7-10.redhat_10.1.el6jws.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHEA-2018:2189" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JWS-5.0:jws5-0:1-5.el6jws.i686", "6Server-JWS-5.0:jws5-0:1-5.el6jws.src", "6Server-JWS-5.0:jws5-0:1-5.el6jws.x86_64", "6Server-JWS-5.0:jws5-ecj-0:4.6.1-5.redhat_1.1.el6jws.noarch", "6Server-JWS-5.0:jws5-ecj-0:4.6.1-5.redhat_1.1.el6jws.src", "6Server-JWS-5.0:jws5-javapackages-tools-0:3.4.1-5.15.7.el6jws.noarch", "6Server-JWS-5.0:jws5-javapackages-tools-0:3.4.1-5.15.7.el6jws.src", "6Server-JWS-5.0:jws5-jboss-logging-0:3.3.1-4.Final_redhat_1.1.el6jws.noarch", "6Server-JWS-5.0:jws5-jboss-logging-0:3.3.1-4.Final_redhat_1.1.el6jws.src", "6Server-JWS-5.0:jws5-mod_cluster-0:1.4.0-8.Final_redhat_1.1.el6jws.noarch", "6Server-JWS-5.0:jws5-mod_cluster-0:1.4.0-8.Final_redhat_1.1.el6jws.src", "6Server-JWS-5.0:jws5-mod_cluster-tomcat-0:1.4.0-8.Final_redhat_1.1.el6jws.noarch", "6Server-JWS-5.0:jws5-python-javapackages-0:3.4.1-5.15.7.el6jws.noarch", "6Server-JWS-5.0:jws5-runtime-0:1-5.el6jws.i686", "6Server-JWS-5.0:jws5-runtime-0:1-5.el6jws.x86_64", "6Server-JWS-5.0:jws5-tomcat-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-0:9.0.7-10.redhat_10.1.el6jws.src", "6Server-JWS-5.0:jws5-tomcat-admin-webapps-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-docs-webapp-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-el-3.0-api-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-javadoc-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-jsp-2.3-api-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-jsvc-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-lib-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.i686", "6Server-JWS-5.0:jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.src", "6Server-JWS-5.0:jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws.x86_64", "6Server-JWS-5.0:jws5-tomcat-native-debuginfo-0:1.2.17-20.redhat_20.el6jws.i686", "6Server-JWS-5.0:jws5-tomcat-native-debuginfo-0:1.2.17-20.redhat_20.el6jws.x86_64", "6Server-JWS-5.0:jws5-tomcat-selinux-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-servlet-4.0-api-0:9.0.7-10.redhat_10.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-vault-0:1.1.7-3.Final_redhat_1.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-vault-0:1.1.7-3.Final_redhat_1.1.el6jws.src", "6Server-JWS-5.0:jws5-tomcat-vault-javadoc-0:1.1.7-3.Final_redhat_1.1.el6jws.noarch", "6Server-JWS-5.0:jws5-tomcat-webapps-0:9.0.7-10.redhat_10.1.el6jws.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: A bug in the UTF-8 decoder can lead to DoS" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.