Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-6816 (GCVE-0-2016-6816)
Vulnerability from cvelistv5
Published
2017-03-20 18:00
Modified
2024-11-14 20:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- character validation bypass
Summary
The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Tomcat |
Version: 9.0.0.M1 to 9.0.0.M11 Version: 8.5.0 to 8.5.6 Version: 8.0.0.RC1 to 8.0.38 Version: 7.0.0 to 7.0.72 Version: 6.0.0 to 6.0.47 Version: Earlier, unsupported versions may also be affected. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:43:38.464Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2017:0250", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0250.html" }, { "name": "41783", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/41783/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13" }, { "name": "94461", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94461" }, { "name": "DSA-3738", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3738" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73" }, { "name": "RHSA-2017:0244", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0244.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "RHSA-2017:0935", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:0935" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180607-0001/" }, { "name": "RHSA-2017:0457", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0457.html" }, { "name": "RHSA-2017:0246", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0246.html" }, { "name": "1037332", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037332" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48" }, { "name": "RHSA-2017:0455", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:0455" }, { "name": "RHSA-2017:0527", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0527.html" }, { "name": "RHSA-2017:0245", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0245.html" }, { "name": "RHSA-2017:0456", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:0456" }, { "name": "RHSA-2017:0247", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0247.html" }, { "name": "[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E" }, { "name": "USN-4557-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4557-1/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2016-6816", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2023-12-12T21:25:30.711531Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-14T20:05:46.260Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Apache Tomcat", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "9.0.0.M1 to 9.0.0.M11" }, { "status": "affected", "version": "8.5.0 to 8.5.6" }, { "status": "affected", "version": "8.0.0.RC1 to 8.0.38" }, { "status": "affected", "version": "7.0.0 to 7.0.72" }, { "status": "affected", "version": "6.0.0 to 6.0.47" }, { "status": "affected", "version": "Earlier, unsupported versions may also be affected." } ] } ], "datePublic": "2016-11-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own." } ], "problemTypes": [ { "descriptions": [ { "description": "character validation bypass", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-05T21:06:19", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "RHSA-2017:0250", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0250.html" }, { "name": "41783", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/41783/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13" }, { "name": "94461", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94461" }, { "name": "DSA-3738", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3738" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73" }, { "name": "RHSA-2017:0244", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0244.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "RHSA-2017:0935", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:0935" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180607-0001/" }, { "name": "RHSA-2017:0457", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0457.html" }, { "name": "RHSA-2017:0246", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0246.html" }, { "name": "1037332", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037332" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48" }, { "name": "RHSA-2017:0455", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:0455" }, { "name": "RHSA-2017:0527", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0527.html" }, { "name": "RHSA-2017:0245", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0245.html" }, { "name": "RHSA-2017:0456", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:0456" }, { "name": "RHSA-2017:0247", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0247.html" }, { "name": "[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E" }, { "name": "USN-4557-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4557-1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2016-6816", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Tomcat", "version": { "version_data": [ { "version_value": "9.0.0.M1 to 9.0.0.M11" }, { "version_value": "8.5.0 to 8.5.6" }, { "version_value": "8.0.0.RC1 to 8.0.38" }, { "version_value": "7.0.0 to 7.0.72" }, { "version_value": "6.0.0 to 6.0.47" }, { "version_value": "Earlier, unsupported versions may also be affected." } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "character validation bypass" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2017:0250", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0250.html" }, { "name": "41783", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41783/" }, { "name": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39", "refsource": "CONFIRM", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39" }, { "name": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13", "refsource": "CONFIRM", "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13" }, { "name": "94461", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94461" }, { "name": "DSA-3738", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3738" }, { "name": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73", "refsource": "CONFIRM", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73" }, { "name": "RHSA-2017:0244", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0244.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "RHSA-2017:0935", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:0935" }, { "name": "https://security.netapp.com/advisory/ntap-20180607-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180607-0001/" }, { "name": "RHSA-2017:0457", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0457.html" }, { "name": "RHSA-2017:0246", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0246.html" }, { "name": "1037332", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037332" }, { "name": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8", "refsource": "CONFIRM", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8" }, { "name": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48", "refsource": "CONFIRM", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48" }, { "name": "RHSA-2017:0455", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:0455" }, { "name": "RHSA-2017:0527", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0527.html" }, { "name": "RHSA-2017:0245", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0245.html" }, { "name": "RHSA-2017:0456", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:0456" }, { "name": "RHSA-2017:0247", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0247.html" }, { "name": "[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E" }, { "name": "USN-4557-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4557-1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2016-6816", "datePublished": "2017-03-20T18:00:00", "dateReserved": "2016-08-12T00:00:00", "dateUpdated": "2024-11-14T20:05:46.260Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-6816\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2017-03-20T18:59:00.173\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.\"},{\"lang\":\"es\",\"value\":\"El c\u00f3digo en Apache Tomcat 9.0.0.M1 a 9.0.0.M11, 8.5.0 a 8.5.6, 8.0.0.RC1 a 8.0.38, 7.0.0 a 7.0.72 y 6.0.0 a 6.0.47 que analiz\u00f3 la l\u00ednea de solicitud HTTP permiti\u00f3 caracteres no v\u00e1lidos. Esto podr\u00eda ser explotado, junto con un proxy que tambi\u00e9n permiti\u00f3 los caracteres no v\u00e1lidos, pero con una interpretaci\u00f3n diferente, para inyectar datos en la respuesta HTTP. Mediante la manipulaci\u00f3n de la respuesta HTTP, el atacante podr\u00eda envenenar una cach\u00e9 web, realizar un ataque XSS y/u obtener informaci\u00f3n sensible de otras solicitudes que no sean las suyas.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":3.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49E3C039-A949-4F1B-892A-57147EECB249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F28C7801-41B9-4552-BA1E-577967BCBBEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25B21085-7259-4685-9D1F-FF98E6489E10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"635EE321-2A1F-4FF8-95BE-0C26591969D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A81B035-8598-4D2C-B45F-C6C9D4B10C2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1096947-82A6-4EA8-A4F2-00D91E3F7DAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EBFA1D3-16A6-4041-BB30-51D2EE0F2AF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B70B372F-EFFD-4AF7-99B5-7D1B23A0C54C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C95ADA4-66F5-45C4-A677-ACE22367A75A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11951A10-39A2-4FF5-8C43-DF94730FB794\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"351E5BCF-A56B-4D91-BA3C-21A4B77D529A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DC2BBB4-171E-4EFF-A575-A5B7FF031755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B6B0504-27C1-4824-A928-A878CBBAB32D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE81AD36-ACD1-4C6C-8E7C-5326D1DA3045\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D903956B-14F5-4177-AF12-0A5F1846D3C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81F847DC-A2F5-456C-9038-16A0E85F4C3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3EBD00-1E1E-452D-AFFB-08A6BD111DDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6B93A3A-D487-4CA1-8257-26F8FE287B8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD8802B2-57E0-4AA6-BC8E-00DE60468569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8461DF95-18DC-4BF5-A703-7F19DA88DC30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F4C9BCF-9C73-4991-B02F-E08C5DA06EBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0682A754-5E5E-48D4-836A-16841FD59445\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A8F2DFC-6A74-43AB-A813-957A1F7097A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"277332E0-60D9-4318-A068-901F3B037FA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2823789C-2CB6-4300-94DB-BDBE83ABA8E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"759588B8-DD36-474E-978B-75638962E743\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5416C76-46ED-4CB1-A7F8-F24EA16DE7F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A61429EE-4331-430C-9830-58DCCBCBCB58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31B3593F-CEDF-423C-90F8-F88EED87DC3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE7862B2-E1FA-4E16-92CD-8918AB461D9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9E03BE3-60CC-4415-B993-D0BB00F87A30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE92E59A-FF0D-4D1A-8B12-CC41A7E1FD3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFD64FE7-ABAF-49F3-B8D0-91C37C822F4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48E5E8C3-21AD-4230-B945-AB7DE66307B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2949EC36-0056-43F0-93EC-681EAC22B112\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4945C8C1-C71B-448B-9075-07C6C92599CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED4730B0-2E09-408B-AFD4-FE00F73700FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8DE8A8A-7643-4292-BCC1-758AE0940207\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CB6826E-FEBF-4DD7-BED5-1942DFA73BE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9B54FCD-CF7C-47E2-8513-40419E47AF49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B9AC2B8-D1AC-48E2-B88E-C7837D4F8A7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D87EFB6D-B626-469F-907C-40C771A55833\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38DA4B34-1759-4FC5-82E9-B2223905B9B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6330B97B-8FC5-4D7E-A960-5D94EDD0C378\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A0B2FA4-772E-4B23-8B3F-CC86515E4226\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AE27868-CBD2-4EB9-8732-DD4C0E10D6D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B1F7611-C424-4B5E-94B3-3B69EABF342E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C132EED-8FCA-4FDA-9FF6-C5FA44E8DA2E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F8C62EF-1B67-456A-9C66-755439CF8556\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A819E245-D641-4F19-9139-6C940504F6E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C381275-10C5-4939-BCE3-0D1F3B3CB2EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7205475A-6D04-4042-B24E-1DA5A57029B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08022987-B36B-4F63-88A5-A8F59195DF4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF4B7557-EF35-451E-B55D-3296966695AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8980E61E-27BE-4858-82B3-C0E8128AF521\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8756BF9B-3E24-4677-87AE-31CE776541F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88CE057E-2092-4C98-8D0C-75CF439D0A9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F194580-EE6D-4E38-87F3-F0661262256B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9731BAA-4C6C-4259-B786-F577D8A90FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F74A421-D019-4248-84B8-C70D4D9A8A95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BA27FF9-4C66-4E17-95C0-1CB2DAA6AFC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05346F5A-FB52-4376-AAC7-9A5308216545\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"305688F2-50A6-41FB-8614-BC589DB9A789\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D24AA431-C436-4AA5-85DF-B9AAFF2548FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25966344-15D5-4101-9346-B06BFD2DFFF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11F4CBAC-27B1-4EFF-955A-A63B457D0578\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD55B338-9DBE-4643-ABED-A08964D3AF7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D4F710E-06EA-48F4-AC6A-6F143950F015\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C4936C2-0B2D-4C44-98C3-443090965F5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48453405-2319-4327-9F4C-6F70B49452C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49DD9544-6424-41A6-AEC0-EC19B8A10E71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4670E65-2E11-49A4-B661-57C2F60D411F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E8FF71D-4710-4FBB-9925-A6A26C450F7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31002A23-4788-4BC7-AE11-A3C2AA31716D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7144EDDF-8265-4642-8EEB-ED52527E0A26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF06B5C1-B9DD-4673-A101-56E1E593ACDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D731065-626B-4425-8E49-F708DD457824\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3D850EA-E537-42C8-93B9-96E15CB26747\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E037DA05-2BEF-4F64-B8BB-307247B6A05C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCAF1EB5-FB34-40FC-96ED-9D073890D8BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D395D95B-1F4A-420E-A0F6-609360AF7B69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BD221BA-0AB6-4972-8AD9-5D37AC07762F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E55B6565-96CB-4F6A-9A80-C3FB82F30546\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3300AFE-49A4-4904-B9A0-5679F09FA01E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED5125CC-05F9-4678-90DB-A5C7CD24AE6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BD93669-1B30-4BF8-AD7D-F60DD8D63CC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B904C74-B92E-4EAE-AE6C-78E2B844C3DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C8C97F-6C9D-4647-AB8A-ADAA5536DDE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C6109D1-BC36-40C5-A02A-7AEBC949BAC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA8A7333-B4C3-4876-AE01-62F2FD315504\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92993E23-D805-407B-8B87-11CEEE8B212F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A11BD74-305C-41E2-95B1-5008EEF5FA5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"595442D0-9DB7-475A-AE30-8535B70E122E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B0BA92A-0BD3-4CE4-9465-95E949104BAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F944B72-B9EB-4EB8-AEA3-E0D7ADBE1305\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AA28D3A-3EE5-4F90-B8F5-4943F7607DA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFD3EB84-2ED2-49D4-8BC9-6398C2E46F0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEDF6E1A-0DD6-42AB-9510-F6F4B6002C91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C947E549-2459-4AFB-84A7-36BDA30B5F29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67A0EA46-5AEA-4D0A-B89E-6560FA10EC08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D55DF79-F9BE-4907-A4D8-96C4B11189ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14AB5787-82D7-4F78-BE93-4556AB7A7D0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8E9453E-BC9B-4F77-85FA-BA15AC55C245\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7EF0518-73F9-47DB-8946-A8334936BEFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95AA8778-7833-4572-A71B-5FD89938CE94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"242E47CE-EF69-4F8F-AB40-5AF2811674CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A225D4F7-174E-47C3-8390-C6FA28DB5A9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDA1555C-E55A-4E14-B786-BFEE3F09220B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BAC42AE-B82A-4ABF-9519-B2D97D925707\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8075E9A-DA7F-4A0B-8B4D-0CD951369111\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"335A5320-6086-4B45-9903-82F6F92A584F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46B33408-C2E2-4E7C-9334-6AB98F13468C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F036676-9EFB-4A92-828E-A38905D594E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.65:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9728EE8-6029-4DF3-942E-E4ACC09111A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.66:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62DBB843-288C-4060-8777-6CDCF1860D29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.67:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34E7DAC8-8419-45D1-A28F-14CF2FE1B6EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.68:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89B87EB5-4902-4C2A-878A-45185F7D0FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.69:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0596E6C-9ACE-4106-A2FF-BED7967C323F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F7158DC-966B-4508-8600-40E3E9D3D0DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.71:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A190FE0D-86C1-49EE-BDAE-5879C32BDC92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA20F45F-01A2-43DD-9731-DFF54E31719F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67E42327-8AEA-4B92-BA5F-AF94430B3BBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A358FDF-C249-4D7A-9445-8B9E7D9D40AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C4DB619-F6B0-4896-9AE2-7E7D92105577\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFF96F96-34DB-4EB3-BF59-11220673FA26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44883383-6360-4BE6-9B48-1308F85E5797\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDF3E379-47D2-4C86-8C6D-8B3C25A0E1C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E82391BD-10FF-4E7F-91DC-35AA11325530\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92C22F12-C072-4A12-A4A9-CBF589A36FF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61E008F8-2F01-4DD8-853A-337B4B4163C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A776B25-6AF1-421B-8E47-2A7499F6B4D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A332FDE-42AE-4F48-9553-5AE953CD6D3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"701424A2-BB06-44B5-B468-7164E4F95529\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BA6388C-5B6E-4651-8AE3-EBCCF61C27E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A63FA521-9D20-49B9-A9A4-0DF891B4E4E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F9A5B7E-33A9-4651-9BE1-371A0064B661\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F99252E8-A59C-48E1-B251-718D7FB3E399\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D05293B-B9D8-42F1-9367-9D2E058EFAD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E0DDEF6-A8EE-46C4-A046-A1F26E7C4E87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14B38892-9C00-4510-B7BA-F2A8F2CACCAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C913AA6-2260-4249-BE1D-7139F45735D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7409B064-D43E-489E-AEC6-0A767FB21737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F019268F-80C4-48FE-8164-E9DA0A3BAFF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EFBD214-FCFE-4F04-A903-66EFDA764B9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"425D86B3-6BB9-410D-8125-F7CF87290AD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EE3BB0D-1002-41E4-9BE8-875D97330057\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25D0E80B-EDDA-4876-912D-44BFE6211EB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6622472B-8644-4D45-A54B-A215C3D64B83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B338F95B-2924-435B-827F-E64420A93244\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"209D1349-7740-4DBE-80A5-E6343C62BAB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09E77C24-C265-403D-A193-B3739713F6B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28616FA3-9A98-4AAE-9F94-3E77A14156EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"335925DA-11C0-4222-B6B7-82602B361751\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"603A14BF-72BB-4A3D-8CBC-932DC45CEC06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C2E1C55-3C89-4F26-A981-1195BCC9BB5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC242407-A447-4ABD-8E19-EB6DB1F35121\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31BB906B-812F-462C-9AEE-147C1418D865\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B701E17-D231-44ED-A46E-C67749A725B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8CAF2F7-D227-4F06-B0E6-533C5EDB105B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"305B73CE-0224-4E73-8EB2-FC41A62FBA08\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69A7FC28-A0EC-4516-9776-700343D2F4DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18814653-6D44-47D9-A2F5-89C5AFB255F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4D811A9-4988-4C11-AA27-F5BE2B93D8D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAEF824D-7E95-4BC1-8DBB-787DCE595E21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97F4A2B3-DB1D-4D0B-B5FF-7EE2A0D291BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B461D5A-1208-498F-B551-46C6D514AC2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"598E5D91-0165-4D55-9EDD-EBB5AAAD1172\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D0689FE-4BC0-4F53-8C79-34B21F9B86C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*\",\"matchCriteriaId\":\"89B129B2-FB6F-4EF9-BF12-E589A87996CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B6787B6-54A8-475E-BA1C-AB99334B2535\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F542E12-6BA8-4504-A494-DA83E7E19BD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C5F004-F7D8-45DB-B173-351C50B0EC16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1902D2E-1896-4D3D-9E1C-3A675255072C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*\",\"matchCriteriaId\":\"49AAF4DF-F61D-47A8-8788-A21E317A145D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*\",\"matchCriteriaId\":\"454211D0-60A2-4661-AECA-4C0121413FEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*\",\"matchCriteriaId\":\"0686F977-889F-4960-8E0B-7784B73A7F2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*\",\"matchCriteriaId\":\"558703AE-DB5E-4DFF-B497-C36694DD7B24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED6273F2-1165-47A4-8DD7-9E9B2472941B\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0244.html\",\"source\":\"security@apache.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0245.html\",\"source\":\"security@apache.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0246.html\",\"source\":\"security@apache.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0247.html\",\"source\":\"security@apache.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0250.html\",\"source\":\"security@apache.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0457.html\",\"source\":\"security@apache.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0527.html\",\"source\":\"security@apache.org\"},{\"url\":\"http://www.debian.org/security/2016/dsa-3738\",\"source\":\"security@apache.org\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html\",\"source\":\"security@apache.org\"},{\"url\":\"http://www.securityfocus.com/bid/94461\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037332\",\"source\":\"security@apache.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:0455\",\"source\":\"security@apache.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:0456\",\"source\":\"security@apache.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:0935\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20180607-0001/\",\"source\":\"security@apache.org\"},{\"url\":\"https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48\",\"source\":\"security@apache.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73\",\"source\":\"security@apache.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39\",\"source\":\"security@apache.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8\",\"source\":\"security@apache.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13\",\"source\":\"security@apache.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4557-1/\",\"source\":\"security@apache.org\"},{\"url\":\"https://www.exploit-db.com/exploits/41783/\",\"source\":\"security@apache.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0244.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0245.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0246.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0247.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0250.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0457.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0527.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2016/dsa-3738\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/94461\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037332\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:0455\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:0456\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:0935\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20180607-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4557-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.exploit-db.com/exploits/41783/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0250.html\", \"name\": \"RHSA-2017:0250\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://www.exploit-db.com/exploits/41783/\", \"name\": \"41783\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"]}, {\"url\": \"https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/94461\", \"name\": \"94461\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}, {\"url\": \"http://www.debian.org/security/2016/dsa-3738\", \"name\": \"DSA-3738\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\", \"x_transferred\"]}, {\"url\": \"https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0244.html\", \"name\": \"RHSA-2017:0244\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:0935\", \"name\": \"RHSA-2017:0935\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20180607-0001/\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0457.html\", \"name\": \"RHSA-2017:0457\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0246.html\", \"name\": \"RHSA-2017:0246\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"http://www.securitytracker.com/id/1037332\", \"name\": \"1037332\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\", \"x_transferred\"]}, {\"url\": \"https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:0455\", \"name\": \"RHSA-2017:0455\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0527.html\", \"name\": \"RHSA-2017:0527\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0245.html\", \"name\": \"RHSA-2017:0245\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:0456\", \"name\": \"RHSA-2017:0456\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0247.html\", \"name\": \"RHSA-2017:0247\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/4557-1/\", \"name\": \"USN-4557-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-06T01:43:38.464Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2016-6816\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2023-12-12T21:25:30.711531Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-14T20:05:26.984Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache Tomcat\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.0.0.M1 to 9.0.0.M11\"}, {\"status\": \"affected\", \"version\": \"8.5.0 to 8.5.6\"}, {\"status\": \"affected\", \"version\": \"8.0.0.RC1 to 8.0.38\"}, {\"status\": \"affected\", \"version\": \"7.0.0 to 7.0.72\"}, {\"status\": \"affected\", \"version\": \"6.0.0 to 6.0.47\"}, {\"status\": \"affected\", \"version\": \"Earlier, unsupported versions may also be affected.\"}]}], \"datePublic\": \"2016-11-08T00:00:00\", \"references\": [{\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0250.html\", \"name\": \"RHSA-2017:0250\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://www.exploit-db.com/exploits/41783/\", \"name\": \"41783\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"]}, {\"url\": \"https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.securityfocus.com/bid/94461\", \"name\": \"94461\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}, {\"url\": \"http://www.debian.org/security/2016/dsa-3738\", \"name\": \"DSA-3738\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\"]}, {\"url\": \"https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0244.html\", \"name\": \"RHSA-2017:0244\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:0935\", \"name\": \"RHSA-2017:0935\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20180607-0001/\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0457.html\", \"name\": \"RHSA-2017:0457\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0246.html\", \"name\": \"RHSA-2017:0246\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"http://www.securitytracker.com/id/1037332\", \"name\": \"1037332\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\"]}, {\"url\": \"https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:0455\", \"name\": \"RHSA-2017:0455\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0527.html\", \"name\": \"RHSA-2017:0527\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0245.html\", \"name\": \"RHSA-2017:0245\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:0456\", \"name\": \"RHSA-2017:0456\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0247.html\", \"name\": \"RHSA-2017:0247\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://usn.ubuntu.com/4557-1/\", \"name\": \"USN-4557-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"character validation bypass\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2020-10-05T21:06:19\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"9.0.0.M1 to 9.0.0.M11\"}, {\"version_value\": \"8.5.0 to 8.5.6\"}, {\"version_value\": \"8.0.0.RC1 to 8.0.38\"}, {\"version_value\": \"7.0.0 to 7.0.72\"}, {\"version_value\": \"6.0.0 to 6.0.47\"}, {\"version_value\": \"Earlier, unsupported versions may also be affected.\"}]}, \"product_name\": \"Apache Tomcat\"}]}, \"vendor_name\": \"Apache Software Foundation\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0250.html\", \"name\": \"RHSA-2017:0250\", \"refsource\": \"REDHAT\"}, {\"url\": \"https://www.exploit-db.com/exploits/41783/\", \"name\": \"41783\", \"refsource\": \"EXPLOIT-DB\"}, {\"url\": \"https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39\", \"name\": \"https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13\", \"name\": \"https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www.securityfocus.com/bid/94461\", \"name\": \"94461\", \"refsource\": \"BID\"}, {\"url\": \"http://www.debian.org/security/2016/dsa-3738\", \"name\": \"DSA-3738\", \"refsource\": \"DEBIAN\"}, {\"url\": \"https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73\", \"name\": \"https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0244.html\", \"name\": \"RHSA-2017:0244\", \"refsource\": \"REDHAT\"}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html\", \"name\": \"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:0935\", \"name\": \"RHSA-2017:0935\", \"refsource\": \"REDHAT\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20180607-0001/\", \"name\": \"https://security.netapp.com/advisory/ntap-20180607-0001/\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0457.html\", \"name\": \"RHSA-2017:0457\", \"refsource\": \"REDHAT\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0246.html\", \"name\": \"RHSA-2017:0246\", \"refsource\": \"REDHAT\"}, {\"url\": \"http://www.securitytracker.com/id/1037332\", \"name\": \"1037332\", \"refsource\": \"SECTRACK\"}, {\"url\": \"https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8\", \"name\": \"https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48\", \"name\": \"https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:0455\", \"name\": \"RHSA-2017:0455\", \"refsource\": \"REDHAT\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0527.html\", \"name\": \"RHSA-2017:0527\", \"refsource\": \"REDHAT\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0245.html\", \"name\": \"RHSA-2017:0245\", \"refsource\": \"REDHAT\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:0456\", \"name\": \"RHSA-2017:0456\", \"refsource\": \"REDHAT\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0247.html\", \"name\": \"RHSA-2017:0247\", \"refsource\": \"REDHAT\"}, {\"url\": \"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E\", \"name\": \"[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/\", \"refsource\": \"MLIST\"}, {\"url\": \"https://usn.ubuntu.com/4557-1/\", \"name\": \"USN-4557-1\", \"refsource\": \"UBUNTU\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"character validation bypass\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2016-6816\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"security@apache.org\"}}}}", "cveMetadata": "{\"cveId\": \"CVE-2016-6816\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-14T20:05:46.260Z\", \"dateReserved\": \"2016-08-12T00:00:00\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2017-03-20T18:00:00\", \"assignerShortName\": \"apache\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
ghsa-jc7p-5r39-9477
Vulnerability from github
Published
2022-05-13 01:14
Modified
2024-02-22 20:24
Severity ?
VLAI Severity ?
Summary
Improper Input Validation in Apache Tomcat
Details
The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.
{ "affected": [ { "database_specific": { "last_known_affected_version_range": "\u003c= 9.0.0.M11" }, "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-coyote" }, "ranges": [ { "events": [ { "introduced": "9.0.0.M1" }, { "fixed": "9.0.0.M12" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-coyote" }, "ranges": [ { "events": [ { "introduced": "8.5.0" }, { "fixed": "8.5.8" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-coyote" }, "ranges": [ { "events": [ { "introduced": "8.0.0RC1" }, { "fixed": "8.0.39" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-coyote" }, "ranges": [ { "events": [ { "introduced": "7.0.0" }, { "fixed": "7.0.73" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-coyote" }, "ranges": [ { "events": [ { "introduced": "6.0.0" }, { "fixed": "6.0.48" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2016-6816" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": true, "github_reviewed_at": "2022-07-06T19:46:59Z", "nvd_published_at": "2017-03-20T18:59:00Z", "severity": "HIGH" }, "details": "The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.", "id": "GHSA-jc7p-5r39-9477", "modified": "2024-02-22T20:24:38Z", "published": "2022-05-13T01:14:53Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6816" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/516bda676ac8d0284da3e0295a7df70391315360" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/cdc0a935c2173aff60039a0b85e57a461381107c" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/f96f5751d418ae5a2f550be040daf9c5f7d99256" }, { "type": "WEB", "url": "https://github.com/apache/tomcat80/commit/779d5d34e68e50d2f721897050b147106992f566" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:0455" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20180607-0001" }, { "type": "WEB", "url": "https://svn.apache.org/viewvc?view=revision\u0026revision=1767641" }, { "type": "WEB", "url": "https://svn.apache.org/viewvc?view=revision\u0026revision=1767645" }, { "type": "WEB", "url": "https://svn.apache.org/viewvc?view=revision\u0026revision=1767653" }, { "type": "WEB", "url": "https://svn.apache.org/viewvc?view=revision\u0026revision=1767675" }, { "type": "WEB", "url": "https://svn.apache.org/viewvc?view=revision\u0026revision=1767683" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4557-1" }, { "type": "WEB", "url": "https://web.archive.org/web/20161204121236/http://www.securityfocus.com/bid/94461" }, { "type": "WEB", "url": "https://web.archive.org/web/20170929085438/http://www.securitytracker.com/id/1037332" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/41783" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:0456" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:0935" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2017-0244.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2017-0245.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2017-0246.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2017-0247.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2017-0250.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2017-0457.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2017-0527.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3738" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "type": "CVSS_V3" } ], "summary": "Improper Input Validation in Apache Tomcat" }
suse-su-2016:3081-1
Vulnerability from csaf_suse
Published
2016-12-10 18:18
Modified
2016-12-10 18:18
Summary
Security update for tomcat
Notes
Title of the patch
Security update for tomcat
Description of the patch
This update for tomcat fixes the following issues:
Feature changes:
The embedded Apache Commons DBCP component was updated to version 2.0. (bsc#1010893 fate#321029)
Security fixes:
- CVE-2016-0762: Realm Timing Attack (bsc#1007854)
- CVE-2016-5018: Security Manager Bypass (bsc#1007855)
- CVE-2016-6794: System Property Disclosure (bsc#1007857)
- CVE-2016-6796: Security Manager Bypass (bsc#1007858)
- CVE-2016-6797: Unrestricted Access to Global Resources (bsc#1007853)
- CVE-2016-8735: Remote code execution vulnerability in JmxRemoteLifecycleListener (bsc#1011805)
- CVE-2016-6816: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests (bsc#1011812)
Bug fixes:
- Enabled optional setenv.sh script. See section '(3.4) Using the 'setenv' script'
in http://tomcat.apache.org/tomcat-8.0-doc/RUNNING.txt. (bsc#1002639)
Patchnames
SUSE-SLE-RPI-12-SP2-2016-1790,SUSE-SLE-SERVER-12-SP2-2016-1790
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for tomcat", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for tomcat fixes the following issues:\n\nFeature changes:\n\nThe embedded Apache Commons DBCP component was updated to version 2.0. (bsc#1010893 fate#321029)\n\nSecurity fixes:\n- CVE-2016-0762: Realm Timing Attack (bsc#1007854)\n- CVE-2016-5018: Security Manager Bypass (bsc#1007855)\n- CVE-2016-6794: System Property Disclosure (bsc#1007857)\n- CVE-2016-6796: Security Manager Bypass (bsc#1007858)\n- CVE-2016-6797: Unrestricted Access to Global Resources (bsc#1007853)\n- CVE-2016-8735: Remote code execution vulnerability in JmxRemoteLifecycleListener (bsc#1011805)\n- CVE-2016-6816: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests (bsc#1011812)\n\nBug fixes:\n- Enabled optional setenv.sh script. See section \u0027(3.4) Using the \u0027setenv\u0027 script\u0027\n in http://tomcat.apache.org/tomcat-8.0-doc/RUNNING.txt. (bsc#1002639)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-RPI-12-SP2-2016-1790,SUSE-SLE-SERVER-12-SP2-2016-1790", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3081-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3081-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163081-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3081-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002465.html" }, { "category": "self", "summary": "SUSE Bug 1002639", "url": "https://bugzilla.suse.com/1002639" }, { "category": "self", "summary": "SUSE Bug 1007853", "url": "https://bugzilla.suse.com/1007853" }, { "category": "self", "summary": "SUSE Bug 1007854", "url": "https://bugzilla.suse.com/1007854" }, { "category": "self", "summary": "SUSE Bug 1007855", "url": "https://bugzilla.suse.com/1007855" }, { "category": "self", "summary": "SUSE Bug 1007857", "url": "https://bugzilla.suse.com/1007857" }, { "category": "self", "summary": "SUSE Bug 1007858", "url": "https://bugzilla.suse.com/1007858" }, { "category": "self", "summary": "SUSE Bug 1010893", "url": "https://bugzilla.suse.com/1010893" }, { "category": "self", "summary": "SUSE Bug 1011805", "url": "https://bugzilla.suse.com/1011805" }, { "category": "self", "summary": "SUSE Bug 1011812", "url": "https://bugzilla.suse.com/1011812" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0762 page", "url": "https://www.suse.com/security/cve/CVE-2016-0762/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5018 page", "url": "https://www.suse.com/security/cve/CVE-2016-5018/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6794 page", "url": "https://www.suse.com/security/cve/CVE-2016-6794/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6796 page", "url": "https://www.suse.com/security/cve/CVE-2016-6796/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6797 page", "url": "https://www.suse.com/security/cve/CVE-2016-6797/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6816 page", "url": "https://www.suse.com/security/cve/CVE-2016-6816/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8735 page", "url": "https://www.suse.com/security/cve/CVE-2016-8735/" } ], "title": "Security update for tomcat", "tracking": { "current_release_date": "2016-12-10T18:18:15Z", "generator": { "date": "2016-12-10T18:18:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3081-1", "initial_release_date": "2016-12-10T18:18:15Z", "revision_history": [ { "date": "2016-12-10T18:18:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "tomcat-8.0.36-17.1.noarch", "product": { "name": "tomcat-8.0.36-17.1.noarch", "product_id": "tomcat-8.0.36-17.1.noarch" } }, { "category": "product_version", "name": "tomcat-admin-webapps-8.0.36-17.1.noarch", "product": { "name": "tomcat-admin-webapps-8.0.36-17.1.noarch", "product_id": "tomcat-admin-webapps-8.0.36-17.1.noarch" } }, { "category": "product_version", "name": "tomcat-docs-webapp-8.0.36-17.1.noarch", "product": { "name": "tomcat-docs-webapp-8.0.36-17.1.noarch", "product_id": "tomcat-docs-webapp-8.0.36-17.1.noarch" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-8.0.36-17.1.noarch", "product": { "name": "tomcat-el-3_0-api-8.0.36-17.1.noarch", "product_id": "tomcat-el-3_0-api-8.0.36-17.1.noarch" } }, { "category": "product_version", "name": "tomcat-javadoc-8.0.36-17.1.noarch", "product": { "name": "tomcat-javadoc-8.0.36-17.1.noarch", "product_id": "tomcat-javadoc-8.0.36-17.1.noarch" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "product": { "name": "tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "product_id": "tomcat-jsp-2_3-api-8.0.36-17.1.noarch" } }, { "category": "product_version", "name": "tomcat-lib-8.0.36-17.1.noarch", "product": { "name": "tomcat-lib-8.0.36-17.1.noarch", "product_id": "tomcat-lib-8.0.36-17.1.noarch" } }, { "category": "product_version", "name": "tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "product": { "name": "tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "product_id": "tomcat-servlet-3_1-api-8.0.36-17.1.noarch" } }, { "category": "product_version", "name": "tomcat-webapps-8.0.36-17.1.noarch", "product": { "name": "tomcat-webapps-8.0.36-17.1.noarch", "product_id": "tomcat-webapps-8.0.36-17.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2", "product": { "name": "SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-8.0.36-17.1.noarch" }, "product_reference": "tomcat-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch" }, "product_reference": "tomcat-admin-webapps-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch" }, "product_reference": "tomcat-docs-webapp-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch" }, "product_reference": "tomcat-el-3_0-api-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch" }, "product_reference": "tomcat-javadoc-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-lib-8.0.36-17.1.noarch" }, "product_reference": "tomcat-lib-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3_1-api-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch" }, "product_reference": "tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" }, "product_reference": "tomcat-webapps-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:tomcat-8.0.36-17.1.noarch" }, "product_reference": "tomcat-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch" }, "product_reference": "tomcat-admin-webapps-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch" }, "product_reference": "tomcat-docs-webapp-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch" }, "product_reference": "tomcat-el-3_0-api-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch" }, "product_reference": "tomcat-javadoc-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:tomcat-lib-8.0.36-17.1.noarch" }, "product_reference": "tomcat-lib-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3_1-api-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch" }, "product_reference": "tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" }, "product_reference": "tomcat-webapps-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-8.0.36-17.1.noarch" }, "product_reference": "tomcat-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch" }, "product_reference": "tomcat-admin-webapps-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch" }, "product_reference": "tomcat-docs-webapp-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch" }, "product_reference": "tomcat-el-3_0-api-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch" }, "product_reference": "tomcat-javadoc-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-lib-8.0.36-17.1.noarch" }, "product_reference": "tomcat-lib-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3_1-api-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch" }, "product_reference": "tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-8.0.36-17.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" }, "product_reference": "tomcat-webapps-8.0.36-17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-0762", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0762" } ], "notes": [ { "category": "general", "text": "The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0762", "url": "https://www.suse.com/security/cve/CVE-2016-0762" }, { "category": "external", "summary": "SUSE Bug 1007854 for CVE-2016-0762", "url": "https://bugzilla.suse.com/1007854" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-10T18:18:15Z", "details": "low" } ], "title": "CVE-2016-0762" }, { "cve": "CVE-2016-5018", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5018" } ], "notes": [ { "category": "general", "text": "In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 a malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5018", "url": "https://www.suse.com/security/cve/CVE-2016-5018" }, { "category": "external", "summary": "SUSE Bug 1007855 for CVE-2016-5018", "url": "https://bugzilla.suse.com/1007855" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-10T18:18:15Z", "details": "low" } ], "title": "CVE-2016-5018" }, { "cve": "CVE-2016-6794", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6794" } ], "notes": [ { "category": "general", "text": "When a SecurityManager is configured, a web application\u0027s ability to read system properties should be controlled by the SecurityManager. In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, 6.0.0 to 6.0.45 the system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6794", "url": "https://www.suse.com/security/cve/CVE-2016-6794" }, { "category": "external", "summary": "SUSE Bug 1007857 for CVE-2016-6794", "url": "https://bugzilla.suse.com/1007857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-10T18:18:15Z", "details": "low" } ], "title": "CVE-2016-6794" }, { "cve": "CVE-2016-6796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6796" } ], "notes": [ { "category": "general", "text": "A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6796", "url": "https://www.suse.com/security/cve/CVE-2016-6796" }, { "category": "external", "summary": "SUSE Bug 1007858 for CVE-2016-6796", "url": "https://bugzilla.suse.com/1007858" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-10T18:18:15Z", "details": "low" } ], "title": "CVE-2016-6796" }, { "cve": "CVE-2016-6797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6797" } ], "notes": [ { "category": "general", "text": "The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6797", "url": "https://www.suse.com/security/cve/CVE-2016-6797" }, { "category": "external", "summary": "SUSE Bug 1007853 for CVE-2016-6797", "url": "https://bugzilla.suse.com/1007853" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-10T18:18:15Z", "details": "low" } ], "title": "CVE-2016-6797" }, { "cve": "CVE-2016-6816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6816" } ], "notes": [ { "category": "general", "text": "The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6816", "url": "https://www.suse.com/security/cve/CVE-2016-6816" }, { "category": "external", "summary": "SUSE Bug 1011812 for CVE-2016-6816", "url": "https://bugzilla.suse.com/1011812" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-10T18:18:15Z", "details": "low" } ], "title": "CVE-2016-6816" }, { "cve": "CVE-2016-8735", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8735" } ], "notes": [ { "category": "general", "text": "Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn\u0027t updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8735", "url": "https://www.suse.com/security/cve/CVE-2016-8735" }, { "category": "external", "summary": "SUSE Bug 1011805 for CVE-2016-8735", "url": "https://bugzilla.suse.com/1011805" }, { "category": "external", "summary": "SUSE Bug 1222908 for CVE-2016-8735", "url": "https://bugzilla.suse.com/1222908" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tomcat-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-admin-webapps-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-docs-webapp-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-el-3_0-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-javadoc-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-jsp-2_3-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-lib-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-servlet-3_1-api-8.0.36-17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tomcat-webapps-8.0.36-17.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-10T18:18:15Z", "details": "moderate" } ], "title": "CVE-2016-8735" } ] }
suse-su-2017:1632-1
Vulnerability from csaf_suse
Published
2017-06-21 06:58
Modified
2017-06-21 06:58
Summary
Security update for tomcat6
Notes
Title of the patch
Security update for tomcat6
Description of the patch
This update for tomcat6 fixes the following issues:
Tomcat was updated to version 6.0.53:
The full changelog is:
http://tomcat.apache.org/tomcat-6.0-doc/changelog.html
Security issues fixed:
- CVE-2017-5647: A bug in the handling of pipelined requests could lead to information disclosure (bsc#1036642)
- CVE-2016-8745: Regression in the error handling methods could lead to information disclosure (bsc#1015119)
- CVE-2016-8735: Remote code execution vulnerability in JmxRemoteLifecycleListener (bsc#1011805)
- CVE-2016-6816: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests (bsc#1011812)
- CVE-2016-6797: Unrestricted Access to Global Resources (bsc#1007853)
- CVE-2016-6796: Manager Bypass (bsc#1007858)
- CVE-2016-6794: System Property Disclosure (bsc#1007857)
- CVE-2016-5018: Security Manager Bypass (bsc#1007855)
- CVE-2016-0762: Realm Timing Attack (bsc#1007854)
- CVE-2016-5388: an arbitrary HTTP_PROXY environment variable might allow remote attackers to redirect outbound HTTP traffic (bsc#988489)
Patchnames
sleposp3-tomcat6-13162,slessp3-tomcat6-13162,slessp4-tomcat6-13162
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for tomcat6", "title": "Title of the patch" }, { "category": "description", "text": "This update for tomcat6 fixes the following issues:\n\nTomcat was updated to version 6.0.53:\n\nThe full changelog is:\n http://tomcat.apache.org/tomcat-6.0-doc/changelog.html\n\nSecurity issues fixed:\n\n- CVE-2017-5647: A bug in the handling of pipelined requests could lead to information disclosure (bsc#1036642)\n- CVE-2016-8745: Regression in the error handling methods could lead to information disclosure (bsc#1015119) \n- CVE-2016-8735: Remote code execution vulnerability in JmxRemoteLifecycleListener (bsc#1011805)\n- CVE-2016-6816: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests (bsc#1011812)\n- CVE-2016-6797: Unrestricted Access to Global Resources (bsc#1007853)\n- CVE-2016-6796: Manager Bypass (bsc#1007858)\n- CVE-2016-6794: System Property Disclosure (bsc#1007857)\n- CVE-2016-5018: Security Manager Bypass (bsc#1007855)\n- CVE-2016-0762: Realm Timing Attack (bsc#1007854)\n- CVE-2016-5388: an arbitrary HTTP_PROXY environment variable might allow remote attackers to redirect outbound HTTP traffic (bsc#988489)\n", "title": "Description of the patch" }, { "category": "details", "text": "sleposp3-tomcat6-13162,slessp3-tomcat6-13162,slessp4-tomcat6-13162", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_1632-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:1632-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171632-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:1632-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-June/002968.html" }, { "category": "self", "summary": "SUSE Bug 1007853", "url": "https://bugzilla.suse.com/1007853" }, { "category": "self", "summary": "SUSE Bug 1007854", "url": "https://bugzilla.suse.com/1007854" }, { "category": "self", "summary": "SUSE Bug 1007855", "url": "https://bugzilla.suse.com/1007855" }, { "category": "self", "summary": "SUSE Bug 1007857", "url": "https://bugzilla.suse.com/1007857" }, { "category": "self", "summary": "SUSE Bug 1007858", "url": "https://bugzilla.suse.com/1007858" }, { "category": "self", "summary": "SUSE Bug 1011805", "url": "https://bugzilla.suse.com/1011805" }, { "category": "self", "summary": "SUSE Bug 1011812", "url": "https://bugzilla.suse.com/1011812" }, { "category": "self", "summary": "SUSE Bug 1015119", "url": "https://bugzilla.suse.com/1015119" }, { "category": "self", "summary": "SUSE Bug 1033448", "url": "https://bugzilla.suse.com/1033448" }, { "category": "self", "summary": "SUSE Bug 1036642", "url": "https://bugzilla.suse.com/1036642" }, { "category": "self", "summary": "SUSE Bug 988489", "url": "https://bugzilla.suse.com/988489" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0762 page", "url": "https://www.suse.com/security/cve/CVE-2016-0762/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5018 page", "url": "https://www.suse.com/security/cve/CVE-2016-5018/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5388 page", "url": "https://www.suse.com/security/cve/CVE-2016-5388/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6794 page", "url": "https://www.suse.com/security/cve/CVE-2016-6794/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6796 page", "url": "https://www.suse.com/security/cve/CVE-2016-6796/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6797 page", "url": "https://www.suse.com/security/cve/CVE-2016-6797/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6816 page", "url": "https://www.suse.com/security/cve/CVE-2016-6816/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8735 page", "url": "https://www.suse.com/security/cve/CVE-2016-8735/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8745 page", "url": "https://www.suse.com/security/cve/CVE-2016-8745/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5647 page", "url": "https://www.suse.com/security/cve/CVE-2017-5647/" } ], "title": "Security update for tomcat6", "tracking": { "current_release_date": "2017-06-21T06:58:33Z", "generator": { "date": "2017-06-21T06:58:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:1632-1", "initial_release_date": "2017-06-21T06:58:33Z", "revision_history": [ { "date": "2017-06-21T06:58:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "tomcat6-6.0.53-0.56.1.noarch", "product": { "name": "tomcat6-6.0.53-0.56.1.noarch", "product_id": "tomcat6-6.0.53-0.56.1.noarch" } }, { "category": "product_version", "name": "tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "product": { "name": "tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "product_id": "tomcat6-admin-webapps-6.0.53-0.56.1.noarch" } }, { "category": "product_version", "name": "tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "product": { "name": "tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "product_id": "tomcat6-docs-webapp-6.0.53-0.56.1.noarch" } }, { "category": "product_version", "name": "tomcat6-javadoc-6.0.53-0.56.1.noarch", "product": { "name": "tomcat6-javadoc-6.0.53-0.56.1.noarch", "product_id": "tomcat6-javadoc-6.0.53-0.56.1.noarch" } }, { "category": "product_version", "name": "tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "product": { "name": "tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "product_id": "tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch" } }, { "category": "product_version", "name": "tomcat6-lib-6.0.53-0.56.1.noarch", "product": { "name": "tomcat6-lib-6.0.53-0.56.1.noarch", "product_id": "tomcat6-lib-6.0.53-0.56.1.noarch" } }, { "category": "product_version", "name": "tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "product": { "name": "tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "product_id": "tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch" } }, { "category": "product_version", "name": "tomcat6-webapps-6.0.53-0.56.1.noarch", "product": { "name": "tomcat6-webapps-6.0.53-0.56.1.noarch", "product_id": "tomcat6-webapps-6.0.53-0.56.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat6-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-javadoc-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-lib-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-webapps-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-javadoc-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-lib-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-webapps-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-javadoc-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-lib-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-webapps-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-javadoc-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-lib-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-webapps-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-javadoc-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-lib-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-6.0.53-0.56.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" }, "product_reference": "tomcat6-webapps-6.0.53-0.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-0762", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0762" } ], "notes": [ { "category": "general", "text": "The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0762", "url": "https://www.suse.com/security/cve/CVE-2016-0762" }, { "category": "external", "summary": "SUSE Bug 1007854 for CVE-2016-0762", "url": "https://bugzilla.suse.com/1007854" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-06-21T06:58:33Z", "details": "low" } ], "title": "CVE-2016-0762" }, { "cve": "CVE-2016-5018", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5018" } ], "notes": [ { "category": "general", "text": "In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 a malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5018", "url": "https://www.suse.com/security/cve/CVE-2016-5018" }, { "category": "external", "summary": "SUSE Bug 1007855 for CVE-2016-5018", "url": "https://bugzilla.suse.com/1007855" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-06-21T06:58:33Z", "details": "low" } ], "title": "CVE-2016-5018" }, { "cve": "CVE-2016-5388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5388" } ], "notes": [ { "category": "general", "text": "Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application\u0027s outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an \"httpoxy\" issue. NOTE: the vendor states \"A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388\"; in other words, this is not a CVE ID for a vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5388", "url": "https://www.suse.com/security/cve/CVE-2016-5388" }, { "category": "external", "summary": "SUSE Bug 988484 for CVE-2016-5388", "url": "https://bugzilla.suse.com/988484" }, { "category": "external", "summary": "SUSE Bug 988486 for CVE-2016-5388", "url": "https://bugzilla.suse.com/988486" }, { "category": "external", "summary": "SUSE Bug 988487 for CVE-2016-5388", "url": "https://bugzilla.suse.com/988487" }, { "category": "external", "summary": "SUSE Bug 988488 for CVE-2016-5388", "url": "https://bugzilla.suse.com/988488" }, { "category": "external", "summary": "SUSE Bug 988489 for CVE-2016-5388", "url": "https://bugzilla.suse.com/988489" }, { "category": "external", "summary": "SUSE Bug 988491 for CVE-2016-5388", "url": "https://bugzilla.suse.com/988491" }, { "category": "external", "summary": "SUSE Bug 988492 for CVE-2016-5388", "url": "https://bugzilla.suse.com/988492" }, { "category": "external", "summary": "SUSE Bug 989125 for CVE-2016-5388", "url": "https://bugzilla.suse.com/989125" }, { "category": "external", "summary": "SUSE Bug 989174 for CVE-2016-5388", "url": "https://bugzilla.suse.com/989174" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-06-21T06:58:33Z", "details": "moderate" } ], "title": "CVE-2016-5388" }, { "cve": "CVE-2016-6794", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6794" } ], "notes": [ { "category": "general", "text": "When a SecurityManager is configured, a web application\u0027s ability to read system properties should be controlled by the SecurityManager. In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, 6.0.0 to 6.0.45 the system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6794", "url": "https://www.suse.com/security/cve/CVE-2016-6794" }, { "category": "external", "summary": "SUSE Bug 1007857 for CVE-2016-6794", "url": "https://bugzilla.suse.com/1007857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-06-21T06:58:33Z", "details": "low" } ], "title": "CVE-2016-6794" }, { "cve": "CVE-2016-6796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6796" } ], "notes": [ { "category": "general", "text": "A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6796", "url": "https://www.suse.com/security/cve/CVE-2016-6796" }, { "category": "external", "summary": "SUSE Bug 1007858 for CVE-2016-6796", "url": "https://bugzilla.suse.com/1007858" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-06-21T06:58:33Z", "details": "low" } ], "title": "CVE-2016-6796" }, { "cve": "CVE-2016-6797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6797" } ], "notes": [ { "category": "general", "text": "The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6797", "url": "https://www.suse.com/security/cve/CVE-2016-6797" }, { "category": "external", "summary": "SUSE Bug 1007853 for CVE-2016-6797", "url": "https://bugzilla.suse.com/1007853" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-06-21T06:58:33Z", "details": "low" } ], "title": "CVE-2016-6797" }, { "cve": "CVE-2016-6816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6816" } ], "notes": [ { "category": "general", "text": "The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6816", "url": "https://www.suse.com/security/cve/CVE-2016-6816" }, { "category": "external", "summary": "SUSE Bug 1011812 for CVE-2016-6816", "url": "https://bugzilla.suse.com/1011812" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-06-21T06:58:33Z", "details": "low" } ], "title": "CVE-2016-6816" }, { "cve": "CVE-2016-8735", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8735" } ], "notes": [ { "category": "general", "text": "Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn\u0027t updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8735", "url": "https://www.suse.com/security/cve/CVE-2016-8735" }, { "category": "external", "summary": "SUSE Bug 1011805 for CVE-2016-8735", "url": "https://bugzilla.suse.com/1011805" }, { "category": "external", "summary": "SUSE Bug 1222908 for CVE-2016-8735", "url": "https://bugzilla.suse.com/1222908" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-06-21T06:58:33Z", "details": "moderate" } ], "title": "CVE-2016-8735" }, { "cve": "CVE-2016-8745", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8745" } ], "notes": [ { "category": "general", "text": "A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8745", "url": "https://www.suse.com/security/cve/CVE-2016-8745" }, { "category": "external", "summary": "SUSE Bug 1015119 for CVE-2016-8745", "url": "https://bugzilla.suse.com/1015119" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-06-21T06:58:33Z", "details": "low" } ], "title": "CVE-2016-8745" }, { "cve": "CVE-2017-5647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5647" } ], "notes": [ { "category": "general", "text": "A bug in the handling of the pipelined requests in Apache Tomcat 9.0.0.M1 to 9.0.0.M18, 8.5.0 to 8.5.12, 8.0.0.RC1 to 8.0.42, 7.0.0 to 7.0.76, and 6.0.0 to 6.0.52, when send file was used, results in the pipelined request being lost when send file processing of the previous request completed. This could result in responses appearing to be sent for the wrong request. For example, a user agent that sent requests A, B and C could see the correct response for request A, the response for request C for request B and no response for request C.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5647", "url": "https://www.suse.com/security/cve/CVE-2017-5647" }, { "category": "external", "summary": "SUSE Bug 1033448 for CVE-2017-5647", "url": "https://bugzilla.suse.com/1033448" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Point of Sale 11 SP3:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP3-TERADATA:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.53-0.56.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.53-0.56.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-06-21T06:58:33Z", "details": "important" } ], "title": "CVE-2017-5647" } ] }
suse-su-2016:3079-1
Vulnerability from csaf_suse
Published
2016-12-10 18:18
Modified
2016-12-10 18:18
Summary
Security update for tomcat
Notes
Title of the patch
Security update for tomcat
Description of the patch
This update for Tomcat provides the following fixes:
Feature changes:
The embedded Apache Commons DBCP component was updated to version 2.0. (bsc#1010893 fate#321029)
Security fixes:
- CVE-2016-0762: Realm Timing Attack (bsc#1007854)
- CVE-2016-5018: Security Manager Bypass (bsc#1007855)
- CVE-2016-6794: System Property Disclosure (bsc#1007857)
- CVE-2016-6796: Manager Bypass (bsc#1007858)
- CVE-2016-6797: Unrestricted Access to Global Resources (bsc#1007853)
- CVE-2016-8735: Remote code execution vulnerability in JmxRemoteLifecycleListener (bsc#1011805)
- CVE-2016-6816: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests (bsc#1011812)
Bugs fixed:
- Fixed StringIndexOutOfBoundsException in WebAppClassLoaderBase.filter().
(bsc#974407)
- Fixed a deployment error in the examples webapp by changing the context.xml
format to the new one introduced by Tomcat 8. (bsc#1004728)
- Enabled optional setenv.sh script. See section '(3.4) Using the 'setenv' script'
in http://tomcat.apache.org/tomcat-8.0-doc/RUNNING.txt. (bsc#1002639)
- Fixed regression caused by CVE-2016-6816.
Patchnames
SUSE-SLE-SERVER-12-SP1-2016-1791
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for tomcat", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for Tomcat provides the following fixes:\n\nFeature changes:\n\nThe embedded Apache Commons DBCP component was updated to version 2.0. (bsc#1010893 fate#321029)\n\nSecurity fixes:\n- CVE-2016-0762: Realm Timing Attack (bsc#1007854)\n- CVE-2016-5018: Security Manager Bypass (bsc#1007855)\n- CVE-2016-6794: System Property Disclosure (bsc#1007857)\n- CVE-2016-6796: Manager Bypass (bsc#1007858)\n- CVE-2016-6797: Unrestricted Access to Global Resources (bsc#1007853)\n- CVE-2016-8735: Remote code execution vulnerability in JmxRemoteLifecycleListener (bsc#1011805)\n- CVE-2016-6816: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests (bsc#1011812)\n\nBugs fixed:\n- Fixed StringIndexOutOfBoundsException in WebAppClassLoaderBase.filter().\n (bsc#974407)\n- Fixed a deployment error in the examples webapp by changing the context.xml\n format to the new one introduced by Tomcat 8. (bsc#1004728)\n- Enabled optional setenv.sh script. See section \u0027(3.4) Using the \u0027setenv\u0027 script\u0027\n in http://tomcat.apache.org/tomcat-8.0-doc/RUNNING.txt. (bsc#1002639)\n- Fixed regression caused by CVE-2016-6816.\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-SP1-2016-1791", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3079-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3079-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163079-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3079-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002463.html" }, { "category": "self", "summary": "SUSE Bug 1002639", "url": "https://bugzilla.suse.com/1002639" }, { "category": "self", "summary": "SUSE Bug 1004728", "url": "https://bugzilla.suse.com/1004728" }, { "category": "self", "summary": "SUSE Bug 1007853", "url": "https://bugzilla.suse.com/1007853" }, { "category": "self", "summary": "SUSE Bug 1007854", "url": "https://bugzilla.suse.com/1007854" }, { "category": "self", "summary": "SUSE Bug 1007855", "url": "https://bugzilla.suse.com/1007855" }, { "category": "self", "summary": "SUSE Bug 1007857", "url": "https://bugzilla.suse.com/1007857" }, { "category": "self", "summary": "SUSE Bug 1007858", "url": "https://bugzilla.suse.com/1007858" }, { "category": "self", "summary": "SUSE Bug 1010893", "url": "https://bugzilla.suse.com/1010893" }, { "category": "self", "summary": "SUSE Bug 1011805", "url": "https://bugzilla.suse.com/1011805" }, { "category": "self", "summary": "SUSE Bug 1011812", "url": "https://bugzilla.suse.com/1011812" }, { "category": "self", "summary": "SUSE Bug 974407", "url": "https://bugzilla.suse.com/974407" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0762 page", "url": "https://www.suse.com/security/cve/CVE-2016-0762/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5018 page", "url": "https://www.suse.com/security/cve/CVE-2016-5018/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6794 page", "url": "https://www.suse.com/security/cve/CVE-2016-6794/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6796 page", "url": "https://www.suse.com/security/cve/CVE-2016-6796/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6797 page", "url": "https://www.suse.com/security/cve/CVE-2016-6797/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6816 page", "url": "https://www.suse.com/security/cve/CVE-2016-6816/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8735 page", "url": "https://www.suse.com/security/cve/CVE-2016-8735/" } ], "title": "Security update for tomcat", "tracking": { "current_release_date": "2016-12-10T18:18:26Z", "generator": { "date": "2016-12-10T18:18:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3079-1", "initial_release_date": "2016-12-10T18:18:26Z", "revision_history": [ { "date": "2016-12-10T18:18:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "tomcat-8.0.32-10.13.2.noarch", "product": { "name": "tomcat-8.0.32-10.13.2.noarch", "product_id": "tomcat-8.0.32-10.13.2.noarch" } }, { "category": "product_version", "name": "tomcat-admin-webapps-8.0.32-10.13.2.noarch", "product": { "name": "tomcat-admin-webapps-8.0.32-10.13.2.noarch", "product_id": "tomcat-admin-webapps-8.0.32-10.13.2.noarch" } }, { "category": "product_version", "name": "tomcat-docs-webapp-8.0.32-10.13.2.noarch", "product": { "name": "tomcat-docs-webapp-8.0.32-10.13.2.noarch", "product_id": "tomcat-docs-webapp-8.0.32-10.13.2.noarch" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "product": { "name": "tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "product_id": "tomcat-el-3_0-api-8.0.32-10.13.2.noarch" } }, { "category": "product_version", "name": "tomcat-javadoc-8.0.32-10.13.2.noarch", "product": { "name": "tomcat-javadoc-8.0.32-10.13.2.noarch", "product_id": "tomcat-javadoc-8.0.32-10.13.2.noarch" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "product": { "name": "tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "product_id": "tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch" } }, { "category": "product_version", "name": "tomcat-lib-8.0.32-10.13.2.noarch", "product": { "name": "tomcat-lib-8.0.32-10.13.2.noarch", "product_id": "tomcat-lib-8.0.32-10.13.2.noarch" } }, { "category": "product_version", "name": "tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "product": { "name": "tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "product_id": "tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch" } }, { "category": "product_version", "name": "tomcat-webapps-8.0.32-10.13.2.noarch", "product": { "name": "tomcat-webapps-8.0.32-10.13.2.noarch", "product_id": "tomcat-webapps-8.0.32-10.13.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-8.0.32-10.13.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:tomcat-8.0.32-10.13.2.noarch" }, "product_reference": "tomcat-8.0.32-10.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-8.0.32-10.13.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch" }, "product_reference": "tomcat-admin-webapps-8.0.32-10.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-8.0.32-10.13.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch" }, "product_reference": "tomcat-docs-webapp-8.0.32-10.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-8.0.32-10.13.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch" }, "product_reference": "tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-8.0.32-10.13.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch" }, "product_reference": "tomcat-javadoc-8.0.32-10.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch" }, "product_reference": "tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-8.0.32-10.13.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch" }, "product_reference": "tomcat-lib-8.0.32-10.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch" }, "product_reference": "tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-8.0.32-10.13.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" }, "product_reference": "tomcat-webapps-8.0.32-10.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-8.0.32-10.13.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-8.0.32-10.13.2.noarch" }, "product_reference": "tomcat-8.0.32-10.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-8.0.32-10.13.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch" }, "product_reference": "tomcat-admin-webapps-8.0.32-10.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-8.0.32-10.13.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch" }, "product_reference": "tomcat-docs-webapp-8.0.32-10.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-8.0.32-10.13.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch" }, "product_reference": "tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-8.0.32-10.13.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch" }, "product_reference": "tomcat-javadoc-8.0.32-10.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch" }, "product_reference": "tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-8.0.32-10.13.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch" }, "product_reference": "tomcat-lib-8.0.32-10.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch" }, "product_reference": "tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-8.0.32-10.13.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" }, "product_reference": "tomcat-webapps-8.0.32-10.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-0762", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0762" } ], "notes": [ { "category": "general", "text": "The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0762", "url": "https://www.suse.com/security/cve/CVE-2016-0762" }, { "category": "external", "summary": "SUSE Bug 1007854 for CVE-2016-0762", "url": "https://bugzilla.suse.com/1007854" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-10T18:18:26Z", "details": "low" } ], "title": "CVE-2016-0762" }, { "cve": "CVE-2016-5018", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5018" } ], "notes": [ { "category": "general", "text": "In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 a malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5018", "url": "https://www.suse.com/security/cve/CVE-2016-5018" }, { "category": "external", "summary": "SUSE Bug 1007855 for CVE-2016-5018", "url": "https://bugzilla.suse.com/1007855" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-10T18:18:26Z", "details": "low" } ], "title": "CVE-2016-5018" }, { "cve": "CVE-2016-6794", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6794" } ], "notes": [ { "category": "general", "text": "When a SecurityManager is configured, a web application\u0027s ability to read system properties should be controlled by the SecurityManager. In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, 6.0.0 to 6.0.45 the system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6794", "url": "https://www.suse.com/security/cve/CVE-2016-6794" }, { "category": "external", "summary": "SUSE Bug 1007857 for CVE-2016-6794", "url": "https://bugzilla.suse.com/1007857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-10T18:18:26Z", "details": "low" } ], "title": "CVE-2016-6794" }, { "cve": "CVE-2016-6796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6796" } ], "notes": [ { "category": "general", "text": "A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6796", "url": "https://www.suse.com/security/cve/CVE-2016-6796" }, { "category": "external", "summary": "SUSE Bug 1007858 for CVE-2016-6796", "url": "https://bugzilla.suse.com/1007858" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-10T18:18:26Z", "details": "low" } ], "title": "CVE-2016-6796" }, { "cve": "CVE-2016-6797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6797" } ], "notes": [ { "category": "general", "text": "The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6797", "url": "https://www.suse.com/security/cve/CVE-2016-6797" }, { "category": "external", "summary": "SUSE Bug 1007853 for CVE-2016-6797", "url": "https://bugzilla.suse.com/1007853" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-10T18:18:26Z", "details": "low" } ], "title": "CVE-2016-6797" }, { "cve": "CVE-2016-6816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6816" } ], "notes": [ { "category": "general", "text": "The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6816", "url": "https://www.suse.com/security/cve/CVE-2016-6816" }, { "category": "external", "summary": "SUSE Bug 1011812 for CVE-2016-6816", "url": "https://bugzilla.suse.com/1011812" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-10T18:18:26Z", "details": "low" } ], "title": "CVE-2016-6816" }, { "cve": "CVE-2016-8735", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8735" } ], "notes": [ { "category": "general", "text": "Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn\u0027t updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8735", "url": "https://www.suse.com/security/cve/CVE-2016-8735" }, { "category": "external", "summary": "SUSE Bug 1011805 for CVE-2016-8735", "url": "https://bugzilla.suse.com/1011805" }, { "category": "external", "summary": "SUSE Bug 1222908 for CVE-2016-8735", "url": "https://bugzilla.suse.com/1222908" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-admin-webapps-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-docs-webapp-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-el-3_0-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-javadoc-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-jsp-2_3-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-lib-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-servlet-3_1-api-8.0.32-10.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tomcat-webapps-8.0.32-10.13.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-10T18:18:26Z", "details": "moderate" } ], "title": "CVE-2016-8735" } ] }
suse-su-2017:1660-1
Vulnerability from csaf_suse
Published
2017-06-23 09:07
Modified
2017-06-23 09:07
Summary
Security update for tomcat
Notes
Title of the patch
Security update for tomcat
Description of the patch
Tomcat was updated to version 7.0.78, fixing various bugs and security issues.
For full details see https://tomcat.apache.org/tomcat-7.0-doc/changelog.html
Security issues fixed:
- CVE-2016-0762: A realm timing attack in tomcat was fixed which could disclose existence of users (bsc#1007854)
- CVE-2016-3092: Usage of vulnerable FileUpload package could have resulted in denial of service (bsc#986359)
- CVE-2016-5018: A security manager bypass via a Tomcat utility method that was accessible to web applications was fixed. (bsc#1007855)
- CVE-2016-5388: Setting HTTP_PROXY environment variable via Proxy header (bsc#988489)
- CVE-2016-6794: A tomcat system property disclosure was fixed. (bsc#1007857)
- CVE-2016-6796: A tomcat security manager bypass via manipulation of the configuration parameters for the JSP Servlet. (bsc#1007858)
- CVE-2016-6797: A tomcat unrestricted access to global resources via ResourceLinkFactory was fixed. (bsc#1007853)
- CVE-2016-6816: A HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests was fixed. (bsc#1011812)
- CVE-2016-8735: A Remote code execution vulnerability in JmxRemoteLifecycleListener was fixed (bsc#1011805)
- CVE-2016-8745: A Tomcat Information Disclosure in the error handling of send file code for the NIO HTTP connector was fixed. (bsc#1015119)
- CVE-2017-5647: A tomcat information disclosure in pipelined request processing was fixed. (bsc#1033448)
- CVE-2017-5648: A tomcat information disclosure due to using incorrect facade objects was fixed (bsc#1033447)
Patchnames
SUSE-SLE-SAP-12-2017-1027,SUSE-SLE-SERVER-12-2017-1027
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for tomcat", "title": "Title of the patch" }, { "category": "description", "text": "\nTomcat was updated to version 7.0.78, fixing various bugs and security issues.\n\nFor full details see https://tomcat.apache.org/tomcat-7.0-doc/changelog.html\n\nSecurity issues fixed:\n\n- CVE-2016-0762: A realm timing attack in tomcat was fixed which could disclose existence of users (bsc#1007854)\n- CVE-2016-3092: Usage of vulnerable FileUpload package could have resulted in denial of service (bsc#986359) \n- CVE-2016-5018: A security manager bypass via a Tomcat utility method that was accessible to web applications was fixed. (bsc#1007855)\n- CVE-2016-5388: Setting HTTP_PROXY environment variable via Proxy header (bsc#988489)\n- CVE-2016-6794: A tomcat system property disclosure was fixed. (bsc#1007857)\n- CVE-2016-6796: A tomcat security manager bypass via manipulation of the configuration parameters for the JSP Servlet. (bsc#1007858)\n- CVE-2016-6797: A tomcat unrestricted access to global resources via ResourceLinkFactory was fixed. (bsc#1007853)\n- CVE-2016-6816: A HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests was fixed. (bsc#1011812)\n- CVE-2016-8735: A Remote code execution vulnerability in JmxRemoteLifecycleListener was fixed (bsc#1011805)\n- CVE-2016-8745: A Tomcat Information Disclosure in the error handling of send file code for the NIO HTTP connector was fixed. (bsc#1015119)\n- CVE-2017-5647: A tomcat information disclosure in pipelined request processing was fixed. (bsc#1033448)\n- CVE-2017-5648: A tomcat information disclosure due to using incorrect facade objects was fixed (bsc#1033447)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2017-1027,SUSE-SLE-SERVER-12-2017-1027", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_1660-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:1660-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171660-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:1660-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-June/002971.html" }, { "category": "self", "summary": "SUSE Bug 1007853", "url": "https://bugzilla.suse.com/1007853" }, { "category": "self", "summary": "SUSE Bug 1007854", "url": "https://bugzilla.suse.com/1007854" }, { "category": "self", "summary": "SUSE Bug 1007855", "url": "https://bugzilla.suse.com/1007855" }, { "category": "self", "summary": "SUSE Bug 1007857", "url": "https://bugzilla.suse.com/1007857" }, { "category": "self", "summary": "SUSE Bug 1007858", "url": "https://bugzilla.suse.com/1007858" }, { "category": "self", "summary": "SUSE Bug 1011805", "url": "https://bugzilla.suse.com/1011805" }, { "category": "self", "summary": "SUSE Bug 1011812", "url": "https://bugzilla.suse.com/1011812" }, { "category": "self", "summary": "SUSE Bug 1015119", "url": "https://bugzilla.suse.com/1015119" }, { "category": "self", "summary": "SUSE Bug 1033447", "url": "https://bugzilla.suse.com/1033447" }, { "category": "self", "summary": "SUSE Bug 1033448", "url": "https://bugzilla.suse.com/1033448" }, { "category": "self", "summary": "SUSE Bug 986359", "url": "https://bugzilla.suse.com/986359" }, { "category": "self", "summary": "SUSE Bug 988489", "url": "https://bugzilla.suse.com/988489" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0762 page", "url": "https://www.suse.com/security/cve/CVE-2016-0762/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3092 page", "url": "https://www.suse.com/security/cve/CVE-2016-3092/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5018 page", "url": "https://www.suse.com/security/cve/CVE-2016-5018/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5388 page", "url": "https://www.suse.com/security/cve/CVE-2016-5388/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6794 page", "url": "https://www.suse.com/security/cve/CVE-2016-6794/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6796 page", "url": "https://www.suse.com/security/cve/CVE-2016-6796/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6797 page", "url": "https://www.suse.com/security/cve/CVE-2016-6797/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6816 page", "url": "https://www.suse.com/security/cve/CVE-2016-6816/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8735 page", "url": "https://www.suse.com/security/cve/CVE-2016-8735/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8745 page", "url": "https://www.suse.com/security/cve/CVE-2016-8745/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5647 page", "url": "https://www.suse.com/security/cve/CVE-2017-5647/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5648 page", "url": "https://www.suse.com/security/cve/CVE-2017-5648/" } ], "title": "Security update for tomcat", "tracking": { "current_release_date": "2017-06-23T09:07:07Z", "generator": { "date": "2017-06-23T09:07:07Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:1660-1", "initial_release_date": "2017-06-23T09:07:07Z", "revision_history": [ { "date": "2017-06-23T09:07:07Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "tomcat-7.0.78-7.13.4.noarch", "product": { "name": "tomcat-7.0.78-7.13.4.noarch", "product_id": "tomcat-7.0.78-7.13.4.noarch" } }, { "category": "product_version", "name": "tomcat-admin-webapps-7.0.78-7.13.4.noarch", "product": { "name": "tomcat-admin-webapps-7.0.78-7.13.4.noarch", "product_id": "tomcat-admin-webapps-7.0.78-7.13.4.noarch" } }, { "category": "product_version", "name": "tomcat-docs-webapp-7.0.78-7.13.4.noarch", "product": { "name": "tomcat-docs-webapp-7.0.78-7.13.4.noarch", "product_id": "tomcat-docs-webapp-7.0.78-7.13.4.noarch" } }, { "category": "product_version", "name": "tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "product": { "name": "tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "product_id": "tomcat-el-2_2-api-7.0.78-7.13.4.noarch" } }, { "category": "product_version", "name": "tomcat-javadoc-7.0.78-7.13.4.noarch", "product": { "name": "tomcat-javadoc-7.0.78-7.13.4.noarch", "product_id": "tomcat-javadoc-7.0.78-7.13.4.noarch" } }, { "category": "product_version", "name": "tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "product": { "name": "tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "product_id": "tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch" } }, { "category": "product_version", "name": "tomcat-lib-7.0.78-7.13.4.noarch", "product": { "name": "tomcat-lib-7.0.78-7.13.4.noarch", "product_id": "tomcat-lib-7.0.78-7.13.4.noarch" } }, { "category": "product_version", "name": "tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "product": { "name": "tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "product_id": "tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch" } }, { "category": "product_version", "name": "tomcat-webapps-7.0.78-7.13.4.noarch", "product": { "name": "tomcat-webapps-7.0.78-7.13.4.noarch", "product_id": "tomcat-webapps-7.0.78-7.13.4.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-7.0.78-7.13.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch" }, "product_reference": "tomcat-7.0.78-7.13.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-7.0.78-7.13.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch" }, "product_reference": "tomcat-admin-webapps-7.0.78-7.13.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-7.0.78-7.13.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch" }, "product_reference": "tomcat-docs-webapp-7.0.78-7.13.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-2_2-api-7.0.78-7.13.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch" }, "product_reference": "tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-7.0.78-7.13.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch" }, "product_reference": "tomcat-javadoc-7.0.78-7.13.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch" }, "product_reference": "tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-7.0.78-7.13.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch" }, "product_reference": "tomcat-lib-7.0.78-7.13.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch" }, "product_reference": "tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-7.0.78-7.13.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" }, "product_reference": "tomcat-webapps-7.0.78-7.13.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-7.0.78-7.13.4.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch" }, "product_reference": "tomcat-7.0.78-7.13.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-7.0.78-7.13.4.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch" }, "product_reference": "tomcat-admin-webapps-7.0.78-7.13.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-7.0.78-7.13.4.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch" }, "product_reference": "tomcat-docs-webapp-7.0.78-7.13.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-2_2-api-7.0.78-7.13.4.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch" }, "product_reference": "tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-7.0.78-7.13.4.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch" }, "product_reference": "tomcat-javadoc-7.0.78-7.13.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch" }, "product_reference": "tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-7.0.78-7.13.4.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch" }, "product_reference": "tomcat-lib-7.0.78-7.13.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch" }, "product_reference": "tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-7.0.78-7.13.4.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch" }, "product_reference": "tomcat-webapps-7.0.78-7.13.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-0762", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0762" } ], "notes": [ { "category": "general", "text": "The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0762", "url": "https://www.suse.com/security/cve/CVE-2016-0762" }, { "category": "external", "summary": "SUSE Bug 1007854 for CVE-2016-0762", "url": "https://bugzilla.suse.com/1007854" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-06-23T09:07:07Z", "details": "low" } ], "title": "CVE-2016-0762" }, { "cve": "CVE-2016-3092", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3092" } ], "notes": [ { "category": "general", "text": "The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3092", "url": "https://www.suse.com/security/cve/CVE-2016-3092" }, { "category": "external", "summary": "SUSE Bug 1068865 for CVE-2016-3092", "url": "https://bugzilla.suse.com/1068865" }, { "category": "external", "summary": "SUSE Bug 986359 for CVE-2016-3092", "url": "https://bugzilla.suse.com/986359" }, { "category": "external", "summary": "SUSE Bug 988489 for CVE-2016-3092", "url": "https://bugzilla.suse.com/988489" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-06-23T09:07:07Z", "details": "important" } ], "title": "CVE-2016-3092" }, { "cve": "CVE-2016-5018", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5018" } ], "notes": [ { "category": "general", "text": "In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 a malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5018", "url": "https://www.suse.com/security/cve/CVE-2016-5018" }, { "category": "external", "summary": "SUSE Bug 1007855 for CVE-2016-5018", "url": "https://bugzilla.suse.com/1007855" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-06-23T09:07:07Z", "details": "low" } ], "title": "CVE-2016-5018" }, { "cve": "CVE-2016-5388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5388" } ], "notes": [ { "category": "general", "text": "Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application\u0027s outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an \"httpoxy\" issue. NOTE: the vendor states \"A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388\"; in other words, this is not a CVE ID for a vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5388", "url": "https://www.suse.com/security/cve/CVE-2016-5388" }, { "category": "external", "summary": "SUSE Bug 988484 for CVE-2016-5388", "url": "https://bugzilla.suse.com/988484" }, { "category": "external", "summary": "SUSE Bug 988486 for CVE-2016-5388", "url": "https://bugzilla.suse.com/988486" }, { "category": "external", "summary": "SUSE Bug 988487 for CVE-2016-5388", "url": "https://bugzilla.suse.com/988487" }, { "category": "external", "summary": "SUSE Bug 988488 for CVE-2016-5388", "url": "https://bugzilla.suse.com/988488" }, { "category": "external", "summary": "SUSE Bug 988489 for CVE-2016-5388", "url": "https://bugzilla.suse.com/988489" }, { "category": "external", "summary": "SUSE Bug 988491 for CVE-2016-5388", "url": "https://bugzilla.suse.com/988491" }, { "category": "external", "summary": "SUSE Bug 988492 for CVE-2016-5388", "url": "https://bugzilla.suse.com/988492" }, { "category": "external", "summary": "SUSE Bug 989125 for CVE-2016-5388", "url": "https://bugzilla.suse.com/989125" }, { "category": "external", "summary": "SUSE Bug 989174 for CVE-2016-5388", "url": "https://bugzilla.suse.com/989174" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-06-23T09:07:07Z", "details": "moderate" } ], "title": "CVE-2016-5388" }, { "cve": "CVE-2016-6794", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6794" } ], "notes": [ { "category": "general", "text": "When a SecurityManager is configured, a web application\u0027s ability to read system properties should be controlled by the SecurityManager. In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, 6.0.0 to 6.0.45 the system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6794", "url": "https://www.suse.com/security/cve/CVE-2016-6794" }, { "category": "external", "summary": "SUSE Bug 1007857 for CVE-2016-6794", "url": "https://bugzilla.suse.com/1007857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-06-23T09:07:07Z", "details": "low" } ], "title": "CVE-2016-6794" }, { "cve": "CVE-2016-6796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6796" } ], "notes": [ { "category": "general", "text": "A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6796", "url": "https://www.suse.com/security/cve/CVE-2016-6796" }, { "category": "external", "summary": "SUSE Bug 1007858 for CVE-2016-6796", "url": "https://bugzilla.suse.com/1007858" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-06-23T09:07:07Z", "details": "low" } ], "title": "CVE-2016-6796" }, { "cve": "CVE-2016-6797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6797" } ], "notes": [ { "category": "general", "text": "The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6797", "url": "https://www.suse.com/security/cve/CVE-2016-6797" }, { "category": "external", "summary": "SUSE Bug 1007853 for CVE-2016-6797", "url": "https://bugzilla.suse.com/1007853" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-06-23T09:07:07Z", "details": "low" } ], "title": "CVE-2016-6797" }, { "cve": "CVE-2016-6816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6816" } ], "notes": [ { "category": "general", "text": "The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6816", "url": "https://www.suse.com/security/cve/CVE-2016-6816" }, { "category": "external", "summary": "SUSE Bug 1011812 for CVE-2016-6816", "url": "https://bugzilla.suse.com/1011812" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-06-23T09:07:07Z", "details": "low" } ], "title": "CVE-2016-6816" }, { "cve": "CVE-2016-8735", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8735" } ], "notes": [ { "category": "general", "text": "Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn\u0027t updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8735", "url": "https://www.suse.com/security/cve/CVE-2016-8735" }, { "category": "external", "summary": "SUSE Bug 1011805 for CVE-2016-8735", "url": "https://bugzilla.suse.com/1011805" }, { "category": "external", "summary": "SUSE Bug 1222908 for CVE-2016-8735", "url": "https://bugzilla.suse.com/1222908" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-06-23T09:07:07Z", "details": "moderate" } ], "title": "CVE-2016-8735" }, { "cve": "CVE-2016-8745", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8745" } ], "notes": [ { "category": "general", "text": "A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8745", "url": "https://www.suse.com/security/cve/CVE-2016-8745" }, { "category": "external", "summary": "SUSE Bug 1015119 for CVE-2016-8745", "url": "https://bugzilla.suse.com/1015119" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-06-23T09:07:07Z", "details": "low" } ], "title": "CVE-2016-8745" }, { "cve": "CVE-2017-5647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5647" } ], "notes": [ { "category": "general", "text": "A bug in the handling of the pipelined requests in Apache Tomcat 9.0.0.M1 to 9.0.0.M18, 8.5.0 to 8.5.12, 8.0.0.RC1 to 8.0.42, 7.0.0 to 7.0.76, and 6.0.0 to 6.0.52, when send file was used, results in the pipelined request being lost when send file processing of the previous request completed. This could result in responses appearing to be sent for the wrong request. For example, a user agent that sent requests A, B and C could see the correct response for request A, the response for request C for request B and no response for request C.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5647", "url": "https://www.suse.com/security/cve/CVE-2017-5647" }, { "category": "external", "summary": "SUSE Bug 1033448 for CVE-2017-5647", "url": "https://bugzilla.suse.com/1033448" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-06-23T09:07:07Z", "details": "important" } ], "title": "CVE-2017-5647" }, { "cve": "CVE-2017-5648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5648" } ], "notes": [ { "category": "general", "text": "While investigating bug 60718, it was noticed that some calls to application listeners in Apache Tomcat 9.0.0.M1 to 9.0.0.M17, 8.5.0 to 8.5.11, 8.0.0.RC1 to 8.0.41, and 7.0.0 to 7.0.75 did not use the appropriate facade object. When running an untrusted application under a SecurityManager, it was therefore possible for that untrusted application to retain a reference to the request or response object and thereby access and/or modify information associated with another web application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5648", "url": "https://www.suse.com/security/cve/CVE-2017-5648" }, { "category": "external", "summary": "SUSE Bug 1033447 for CVE-2017-5648", "url": "https://bugzilla.suse.com/1033447" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server 12-LTSS:tomcat-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.78-7.13.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.78-7.13.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-06-23T09:07:07Z", "details": "low" } ], "title": "CVE-2017-5648" } ] }
rhsa-2017:0456
Vulnerability from csaf_redhat
Published
2017-03-07 19:06
Modified
2025-07-07 10:46
Summary
Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 security and enhancement update
Notes
Topic
An update is now available for Red Hat JBoss Web Server 3 for RHEL 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.
This release of Red Hat JBoss Web Server 3.1.0 serves as a replacement for Red Hat JBoss Web Server 3.0.3, and includes enhancements.
Security Fix(es):
* It was reported that the Tomcat init script performed unsafe file handling, which could result in local privilege escalation. (CVE-2016-1240)
* It was discovered that the Tomcat packages installed certain configuration files read by the Tomcat initialization script as writeable to the tomcat group. A member of the group or a malicious web application deployed on Tomcat could use this flaw to escalate their privileges. (CVE-2016-6325)
* The JmxRemoteLifecycleListener was not updated to take account of Oracle's fix for CVE-2016-3427. JMXRemoteLifecycleListener is only included in EWS 2.x and JWS 3.x source distributions. If you deploy a Tomcat instance built from source, using the EWS 2.x, or JWS 3.x distributions, an attacker could use this flaw to launch a remote code execution attack on your deployed instance. (CVE-2016-8735)
* A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long. (CVE-2016-3092)
* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own. (CVE-2016-6816)
* A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body. (CVE-2016-8745)
* The Realm implementations did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder. (CVE-2016-0762)
* It was discovered that a malicious web application could bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications. (CVE-2016-5018)
* It was discovered that when a SecurityManager is configured Tomcat's system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible. (CVE-2016-6794)
* It was discovered that a malicious web application could bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet. (CVE-2016-6796)
* It was discovered that it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not. (CVE-2016-6797)
The CVE-2016-6325 issue was discovered by Red Hat Product Security.
Enhancement(s):
* This enhancement update adds the Red Hat JBoss Web Server 3.1.0 packages to Red Hat Enterprise Linux 7. These packages provide a number of enhancements over the previous version of Red Hat JBoss Web Server. (JIRA#JWS-268)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Web Server 3 for RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 3.1.0 serves as a replacement for Red Hat JBoss Web Server 3.0.3, and includes enhancements.\n\nSecurity Fix(es):\n\n* It was reported that the Tomcat init script performed unsafe file handling, which could result in local privilege escalation. (CVE-2016-1240)\n\n* It was discovered that the Tomcat packages installed certain configuration files read by the Tomcat initialization script as writeable to the tomcat group. A member of the group or a malicious web application deployed on Tomcat could use this flaw to escalate their privileges. (CVE-2016-6325)\n\n* The JmxRemoteLifecycleListener was not updated to take account of Oracle\u0027s fix for CVE-2016-3427. JMXRemoteLifecycleListener is only included in EWS 2.x and JWS 3.x source distributions. If you deploy a Tomcat instance built from source, using the EWS 2.x, or JWS 3.x distributions, an attacker could use this flaw to launch a remote code execution attack on your deployed instance. (CVE-2016-8735)\n\n* A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long. (CVE-2016-3092)\n\n* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own. (CVE-2016-6816)\n\n* A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body. (CVE-2016-8745)\n\n* The Realm implementations did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder. (CVE-2016-0762)\n\n* It was discovered that a malicious web application could bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications. (CVE-2016-5018)\n\n* It was discovered that when a SecurityManager is configured Tomcat\u0027s system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible. (CVE-2016-6794)\n\n* It was discovered that a malicious web application could bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet. (CVE-2016-6796)\n\n* It was discovered that it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not. (CVE-2016-6797)\n\nThe CVE-2016-6325 issue was discovered by Red Hat Product Security.\n\nEnhancement(s):\n\n* This enhancement update adds the Red Hat JBoss Web Server 3.1.0 packages to Red Hat Enterprise Linux 7. These packages provide a number of enhancements over the previous version of Red Hat JBoss Web Server. (JIRA#JWS-268)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0456", "url": "https://access.redhat.com/errata/RHSA-2017:0456" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1349468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349468" }, { "category": "external", "summary": "1367447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367447" }, { "category": "external", "summary": "1376712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376712" }, { "category": "external", "summary": "1390493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390493" }, { "category": "external", "summary": "1390515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390515" }, { "category": "external", "summary": "1390520", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390520" }, { "category": "external", "summary": "1390525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390525" }, { "category": "external", "summary": "1390526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390526" }, { "category": "external", "summary": "1397484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397484" }, { "category": "external", "summary": "1397485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397485" }, { "category": "external", "summary": "1403824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403824" }, { "category": "external", "summary": "JWS-268", "url": "https://issues.redhat.com/browse/JWS-268" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0456.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 security and enhancement update", "tracking": { "current_release_date": "2025-07-07T10:46:10+00:00", "generator": { "date": "2025-07-07T10:46:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.3" } }, "id": "RHSA-2017:0456", "initial_release_date": "2017-03-07T19:06:06+00:00", "revision_history": [ { "date": "2017-03-07T19:06:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-03-07T19:06:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-07T10:46:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 3.1 for RHEL 7", "product": { "name": "Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" }, { "branches": [ { "category": "product_version", "name": "hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-eap6@4.2.23-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-envers-eap6@4.2.23-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-c3p0-eap6@4.2.23-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-core-eap6@4.2.23-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-entitymanager-eap6@4.2.23-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "product": { "name": "mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "product_id": "mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster@1.3.5-2.Final_redhat_2.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "product": { "name": "mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "product_id": "mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-tomcat8@1.3.5-2.Final_redhat_2.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "product": { "name": "mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "product_id": "mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-tomcat7@1.3.5-2.Final_redhat_2.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "product": { "name": "jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "product_id": "jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon@1.0.15-1.redhat_2.1.jbcs.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "product": { "name": "jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "product_id": "jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-runtime@1-3.jbcs.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "product": { "name": "tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "product_id": "tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-vault@1.0.8-9.Final_redhat_2.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "product": { "name": "tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "product_id": "tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-selinux@7.0.70-16.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "product": { "name": "tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "product_id": "tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-jsvc@7.0.70-16.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "product": { "name": "tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "product_id": "tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.70-16.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "product": { "name": "tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "product_id": "tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.70-16.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "product": { "name": "tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "product_id": "tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-el-2.2-api@7.0.70-16.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "product": { "name": "tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "product_id": "tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.70-16.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "product": { "name": "tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "product_id": "tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.70-16.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "product": { "name": "tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "product_id": "tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.70-16.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "product": { "name": "tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "product_id": "tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.70-16.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-0:7.0.70-16.ep7.el7.noarch", "product": { "name": "tomcat7-0:7.0.70-16.ep7.el7.noarch", "product_id": "tomcat7-0:7.0.70-16.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7@7.0.70-16.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "product": { "name": "tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "product_id": "tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-lib@7.0.70-16.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "product": { "name": "tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "product_id": "tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.70-16.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-0:8.0.36-17.ep7.el7.noarch", "product": { "name": "tomcat8-0:8.0.36-17.ep7.el7.noarch", "product_id": "tomcat8-0:8.0.36-17.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8@8.0.36-17.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "product": { "name": "tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "product_id": "tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-log4j@8.0.36-17.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "product": { "name": "tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "product_id": "tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-admin-webapps@8.0.36-17.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "product": { "name": "tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "product_id": "tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-jsvc@8.0.36-17.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "product": { "name": "tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "product_id": "tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-servlet-3.1-api@8.0.36-17.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "product": { "name": "tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "product_id": "tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-el-2.2-api@8.0.36-17.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "product": { "name": "tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "product_id": "tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-docs-webapp@8.0.36-17.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "product": { "name": "tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "product_id": "tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-selinux@8.0.36-17.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "product": { "name": "tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "product_id": "tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-jsp-2.3-api@8.0.36-17.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch", "product": { "name": "tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch", "product_id": "tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-webapps@8.0.36-17.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "product": { "name": "tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "product_id": "tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-lib@8.0.36-17.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "product": { "name": "tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "product_id": "tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-javadoc@8.0.36-17.ep7.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "product": { "name": "hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "product_id": "hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-eap6@4.2.23-1.Final_redhat_1.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "product": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "product_id": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon-jsvc@1.0.15-17.redhat_2.jbcs.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "product": { "name": "mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "product_id": "mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster@1.3.5-2.Final_redhat_2.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "product": { "name": "jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "product_id": "jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon@1.0.15-1.redhat_2.1.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "product": { "name": "tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "product_id": "tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-vault@1.0.8-9.Final_redhat_2.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "tomcat7-0:7.0.70-16.ep7.el7.src", "product": { "name": "tomcat7-0:7.0.70-16.ep7.el7.src", "product_id": "tomcat7-0:7.0.70-16.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7@7.0.70-16.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "tomcat8-0:8.0.36-17.ep7.el7.src", "product": { "name": "tomcat8-0:8.0.36-17.ep7.el7.src", "product_id": "tomcat8-0:8.0.36-17.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8@8.0.36-17.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "product": { "name": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "product_id": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.2.8-9.redhat_9.ep7.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo@1.0.15-17.redhat_2.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon-jsvc@1.0.15-17.redhat_2.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "product": { "name": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "product_id": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.2.8-9.redhat_9.ep7.el7?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "product": { "name": "tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "product_id": "tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.2.8-9.redhat_9.ep7.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src" }, "product_reference": "hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch" }, "product_reference": "jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch" }, "product_reference": "mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src" }, "product_reference": "mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch" }, "product_reference": "mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch" }, "product_reference": "mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src" }, "product_reference": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64" }, "product_reference": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64" }, "product_reference": "tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch" }, "product_reference": "tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src" }, "product_reference": "tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-0:7.0.70-16.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch" }, "product_reference": "tomcat7-0:7.0.70-16.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-0:7.0.70-16.ep7.el7.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src" }, "product_reference": "tomcat7-0:7.0.70-16.ep7.el7.src", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch" }, "product_reference": "tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch" }, "product_reference": "tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch" }, "product_reference": "tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch" }, "product_reference": "tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch" }, "product_reference": "tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch" }, "product_reference": "tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-lib-0:7.0.70-16.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch" }, "product_reference": "tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch" }, "product_reference": "tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch" }, "product_reference": "tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch" }, "product_reference": "tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch" }, "product_reference": "tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-0:8.0.36-17.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch" }, "product_reference": "tomcat8-0:8.0.36-17.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-0:8.0.36-17.ep7.el7.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src" }, "product_reference": "tomcat8-0:8.0.36-17.ep7.el7.src", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch" }, "product_reference": "tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch" }, "product_reference": "tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch" }, "product_reference": "tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch" }, "product_reference": "tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch" }, "product_reference": "tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch" }, "product_reference": "tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-lib-0:8.0.36-17.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch" }, "product_reference": "tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch" }, "product_reference": "tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch" }, "product_reference": "tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch" }, "product_reference": "tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" }, "product_reference": "tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-0762", "discovery_date": "2016-10-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1390526" } ], "notes": [ { "category": "description", "text": "The Realm implementations did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: timing attack in Realm implementation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0762" }, { "category": "external", "summary": "RHBZ#1390526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390526" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0762", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0762" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37" } ], "release_date": "2016-10-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:06:06+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: timing attack in Realm implementation" }, { "cve": "CVE-2016-1240", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2016-09-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1376712" } ], "notes": [ { "category": "description", "text": "It was reported that the Tomcat init script performed unsafe file handling, which could result in local privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: unsafe chown of catalina.log in tomcat init script allows privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1240" }, { "category": "external", "summary": "RHBZ#1376712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376712" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1240", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1240" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1240", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1240" }, { "category": "external", "summary": "http://legalhackers.com/advisories/Tomcat-DebPkgs-Root-Privilege-Escalation-Exploit-CVE-2016-1240.txt", "url": "http://legalhackers.com/advisories/Tomcat-DebPkgs-Root-Privilege-Escalation-Exploit-CVE-2016-1240.txt" } ], "release_date": "2016-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:06:06+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: unsafe chown of catalina.log in tomcat init script allows privilege escalation" }, { "cve": "CVE-2016-3092", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1349468" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Usage of vulnerable FileUpload package can result in denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3092" }, { "category": "external", "summary": "RHBZ#1349468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349468" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3092", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3092" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3092", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3092" }, { "category": "external", "summary": "http://tomcat.apache.org/security-7.html", "url": "http://tomcat.apache.org/security-7.html" }, { "category": "external", "summary": "http://tomcat.apache.org/security-8.html", "url": "http://tomcat.apache.org/security-8.html" } ], "release_date": "2016-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:06:06+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Usage of vulnerable FileUpload package can result in denial of service" }, { "cve": "CVE-2016-5018", "discovery_date": "2016-10-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1390525" } ], "notes": [ { "category": "description", "text": "It was discovered that a malicious web application could bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: security manager bypass via IntrospectHelper utility function", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5018" }, { "category": "external", "summary": "RHBZ#1390525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5018", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5018" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5018", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5018" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37" } ], "release_date": "2016-10-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:06:06+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: security manager bypass via IntrospectHelper utility function" }, { "acknowledgments": [ { "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-6325", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2016-08-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1367447" } ], "notes": [ { "category": "description", "text": "It was discovered that the Tomcat packages installed certain configuration files read by the Tomcat initialization script as writeable to the tomcat group. A member of the group or a malicious web application deployed on Tomcat could use this flaw to escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: tomcat writable config files allow privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6325" }, { "category": "external", "summary": "RHBZ#1367447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367447" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6325", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6325" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6325", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6325" } ], "release_date": "2016-10-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:06:06+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: tomcat writable config files allow privilege escalation" }, { "cve": "CVE-2016-6794", "discovery_date": "2016-10-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1390520" } ], "notes": [ { "category": "description", "text": "It was discovered that when a SecurityManager was configured, Tomcat\u0027s system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: system property disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6794" }, { "category": "external", "summary": "RHBZ#1390520", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390520" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6794", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6794" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6794", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6794" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37" } ], "release_date": "2016-10-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:06:06+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: system property disclosure" }, { "cve": "CVE-2016-6796", "discovery_date": "2016-10-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1390515" } ], "notes": [ { "category": "description", "text": "It was discovered that a malicious web application could bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: security manager bypass via JSP Servlet config parameters", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6796" }, { "category": "external", "summary": "RHBZ#1390515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390515" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6796", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6796" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6796", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6796" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37" } ], "release_date": "2016-10-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:06:06+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: security manager bypass via JSP Servlet config parameters" }, { "cve": "CVE-2016-6797", "discovery_date": "2016-10-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1390493" } ], "notes": [ { "category": "description", "text": "It was discovered that it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: unrestricted access to global resources", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6797" }, { "category": "external", "summary": "RHBZ#1390493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390493" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6797", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6797" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6797", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6797" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37" } ], "release_date": "2016-10-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:06:06+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: unrestricted access to global resources" }, { "cve": "CVE-2016-6816", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2016-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1397484" } ], "notes": [ { "category": "description", "text": "It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests", "title": "Vulnerability summary" }, { "category": "other", "text": "Applying the fix provided to mitigate this issue may cause Tomcat to return 400 status after updating. For more information, refer to https://access.redhat.com/solutions/2891171", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6816" }, { "category": "external", "summary": "RHBZ#1397484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6816" }, { "category": "external", "summary": "https://access.redhat.com/articles/2991951", "url": "https://access.redhat.com/articles/2991951" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2891171", "url": "https://access.redhat.com/solutions/2891171" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8" } ], "release_date": "2016-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:06:06+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests" }, { "cve": "CVE-2016-8735", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2016-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1397485" } ], "notes": [ { "category": "description", "text": "The JmxRemoteLifecycleListener was not updated to take account of Oracle\u0027s fix for CVE-2016-3427. JMXRemoteLifecycleListener is only included in EWS 2.x and JWS 3.x source distributions. If you deploy a Tomcat instance built from source, using the EWS 2.x, or JWS 3.x distributions, an attacker could use this flaw to launch a remote code execution attack on your deployed instance.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Remote code execution vulnerability in JmxRemoteLifecycleListener", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8735" }, { "category": "external", "summary": "RHBZ#1397485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397485" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8735", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8735" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8735", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8735" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2016-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:06:06+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-05-12T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "tomcat: Remote code execution vulnerability in JmxRemoteLifecycleListener" }, { "cve": "CVE-2016-8745", "discovery_date": "2016-12-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1403824" } ], "notes": [ { "category": "description", "text": "A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: information disclosure due to incorrect Processor sharing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8745" }, { "category": "external", "summary": "RHBZ#1403824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403824" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8745", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8745" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8745", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8745" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.49", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.49" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.74", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.74" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.40", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.40" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.9", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.9" } ], "release_date": "2016-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:06:06+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0456" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.src", "7Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.noarch", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.src", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el7.x86_64", "7Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: information disclosure due to incorrect Processor sharing" } ] }
rhsa-2017:0245
Vulnerability from csaf_redhat
Published
2017-02-02 20:36
Modified
2025-07-10 09:52
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
Notes
Topic
An update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7.
This release of Red Hat JBoss Enterprise Application Platform 6.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.12, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* It was discovered that the jboss init script performed unsafe file handling which could result in local privilege escalation. (CVE-2016-8656)
* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own. (CVE-2016-6816)
* An EAP feature to download server log files allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user's browser to request the log files consuming enough resources that normal server functioning could be impaired. (CVE-2016-8627)
* It was discovered that when configuring RBAC and marking information as sensitive, users with a Monitor role are able to view the sensitive information. (CVE-2016-7061)
The CVE-2016-8627 issue was discovered by Darran Lofthouse (Red Hat) and Brian Stansberry (Red Hat).
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7.\n\nThis release of Red Hat JBoss Enterprise Application Platform 6.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.12, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* It was discovered that the jboss init script performed unsafe file handling which could result in local privilege escalation. (CVE-2016-8656)\n\n* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own. (CVE-2016-6816)\n\n* An EAP feature to download server log files allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user\u0027s browser to request the log files consuming enough resources that normal server functioning could be impaired. (CVE-2016-8627)\n\n* It was discovered that when configuring RBAC and marking information as sensitive, users with a Monitor role are able to view the sensitive information. (CVE-2016-7061)\n\nThe CVE-2016-8627 issue was discovered by Darran Lofthouse (Red Hat) and Brian Stansberry (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0245", "url": "https://access.redhat.com/errata/RHSA-2017:0245" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/", "url": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/" }, { "category": "external", "summary": "1380852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380852" }, { "category": "external", "summary": "1388240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388240" }, { "category": "external", "summary": "1397484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397484" }, { "category": "external", "summary": "1400344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400344" }, { "category": "external", "summary": "1401972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401972" }, { "category": "external", "summary": "1403852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403852" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0245.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update", "tracking": { "current_release_date": "2025-07-10T09:52:41+00:00", "generator": { "date": "2025-07-10T09:52:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.3" } }, "id": "RHSA-2017:0245", "initial_release_date": "2017-02-02T20:36:51+00:00", "revision_history": [ { "date": "2017-02-02T20:36:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-02-02T20:36:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-10T09:52:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.src", "product": { "name": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.src", "product_id": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@7.5.20-1.Final_redhat_1.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.src", "product": { "name": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.src", "product_id": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy@2.3.16-1.Final_redhat_1.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "product": { "name": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "product_id": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-console@2.5.15-1.Final_redhat_1.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "product": { "name": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "product_id": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-hal@2.5.15-1.Final_redhat_1.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.src", "product": { "name": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.src", "product_id": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-cxf@2.7.18-5.SP4_redhat_1.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.src", "product": { "name": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.src", "product_id": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/infinispan@5.2.20-1.Final_redhat_1.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.src", "product": { "name": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.src", "product_id": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-ejb-client@1.0.38-1.Final_redhat_1.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.src", "product": { "name": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.src", "product_id": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hornetq@2.3.25-18.SP16_redhat_1.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.src", "product_id": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-javadocs@7.5.13-3.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-version@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxrs@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ejb3@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-embedded@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-configadmin@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-platform-mbean@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-server@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsf@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-repository@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-clustering@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-weld@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-mail@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-webservices@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-sar@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-xts@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-management@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-remoting@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jdr@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-host-controller@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jacorb@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-logging@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-client-all@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-naming@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller-client@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cmp@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-http@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-security@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-threads@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-picketlink@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-transactions@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-scanner@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-messaging@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-modcluster@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-appclient@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-web@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-network@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cli@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-core-security@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-process-controller@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-management-client-content@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsr77@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-connector@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-pojo@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee-deployment@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-system-jmx@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-service@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-configadmin@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxr@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jpa@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jmx@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-protocol@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-appclient@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-welcome-content-eap@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-bundles@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-core@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-product-eap@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_id": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-modules-eap@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "product_id": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-standalone@7.5.13-5.Final_redhat_2.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "product": { "name": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "product_id": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-domain@7.5.13-5.Final_redhat_2.1.ep6.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@7.5.20-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy@2.3.16-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-console@2.5.15-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-hal@2.5.15-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.noarch", "product": { "name": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.noarch", "product_id": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-cxf@2.7.18-5.SP4_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/infinispan-cachestore-jdbc@5.2.20-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/infinispan-core@5.2.20-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/infinispan@5.2.20-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/infinispan-cachestore-remote@5.2.20-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/infinispan-client-hotrod@5.2.20-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-ejb-client@1.0.38-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.noarch", "product": { "name": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.noarch", "product_id": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hornetq@2.3.25-18.SP16_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-javadocs@7.5.13-3.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-version@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxrs@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ejb3@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-embedded@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-configadmin@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-platform-mbean@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-server@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsf@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-repository@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-clustering@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-weld@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-mail@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-webservices@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-sar@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-xts@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-management@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-remoting@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jdr@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-host-controller@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jacorb@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-logging@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-client-all@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-naming@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller-client@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cmp@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-http@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-security@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-threads@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-picketlink@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-transactions@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-scanner@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-messaging@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-modcluster@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-appclient@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-web@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-network@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cli@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-core-security@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-process-controller@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-management-client-content@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsr77@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-connector@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-pojo@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee-deployment@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-system-jmx@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-service@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-configadmin@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxr@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jpa@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jmx@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-protocol@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-appclient@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-welcome-content-eap@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-bundles@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-core@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-product-eap@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-modules-eap@7.5.13-2.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-standalone@7.5.13-5.Final_redhat_2.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "product": { "name": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "product_id": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-domain@7.5.13-5.Final_redhat_2.1.ep6.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.noarch" }, "product_reference": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.src" }, "product_reference": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.noarch" }, "product_reference": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.src" }, "product_reference": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.src" }, "product_reference": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src" }, "product_reference": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.src" }, "product_reference": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src" }, "product_reference": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch" }, "product_reference": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src" }, "product_reference": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.src" }, "product_reference": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.src" }, "product_reference": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-6816", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2016-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1397484" } ], "notes": [ { "category": "description", "text": "It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests", "title": "Vulnerability summary" }, { "category": "other", "text": "Applying the fix provided to mitigate this issue may cause Tomcat to return 400 status after updating. For more information, refer to https://access.redhat.com/solutions/2891171", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6816" }, { "category": "external", "summary": "RHBZ#1397484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6816" }, { "category": "external", "summary": "https://access.redhat.com/articles/2991951", "url": "https://access.redhat.com/articles/2991951" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2891171", "url": "https://access.redhat.com/solutions/2891171" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8" } ], "release_date": "2016-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-02T20:36:51+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests" }, { "cve": "CVE-2016-7061", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2016-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1380852" } ], "notes": [ { "category": "description", "text": "It was discovered that when configuring RBAC and marking information as sensitive, users with a Monitor role are able to view the sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "EAP: Sensitive data can be exposed at the server level in domain mode", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7061" }, { "category": "external", "summary": "RHBZ#1380852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380852" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7061", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7061" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7061", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7061" } ], "release_date": "2016-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-02T20:36:51+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "EAP: Sensitive data can be exposed at the server level in domain mode" }, { "acknowledgments": [ { "names": [ "Brian Stansberry", "Darran Lofthouse" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-8627", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2016-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388240" } ], "notes": [ { "category": "description", "text": "An EAP feature to download server log files allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user\u0027s browser to request the log files consuming enough resources that normal server functioning could be impaired.", "title": "Vulnerability description" }, { "category": "summary", "text": "admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8627" }, { "category": "external", "summary": "RHBZ#1388240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8627", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8627" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8627", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8627" } ], "release_date": "2017-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-02T20:36:51+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files" }, { "cve": "CVE-2016-8656", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2016-09-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1400344" } ], "notes": [ { "category": "description", "text": "It was discovered that the jboss init script performed unsafe file handling which could result in local privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "It was found that a variant of the Tomcat CVE-2016-1240 exploit is also applicable to Red Hat JBoss Enterprise Application Platform 5, 6, and 7. CVE-2016-8656 addresses these problems with JBoss EAP. The issue is now corrected in the various versions of Red Hat JBoss Enterprise Application Platform including EAP 6.4.13 and EAP 7.0.5. For further information please refer to https://access.redhat.com/articles/3016681", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8656" }, { "category": "external", "summary": "RHBZ#1400344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8656", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8656" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8656", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8656" } ], "release_date": "2016-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-02T20:36:51+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0245" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation" } ] }
rhsa-2017:0457
Vulnerability from csaf_redhat
Published
2017-03-07 19:05
Modified
2025-07-07 10:46
Summary
Red Hat Security Advisory: Red Hat JBoss Web Server security and enhancement update
Notes
Topic
An update is now available for Red Hat JBoss Web Server.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.
This release of Red Hat JBoss Web Server 3.1.0 serves as a replacement for Red Hat JBoss Web Server 3.0.3, and includes enhancements.
Security Fix(es):
* It was reported that the Tomcat init script performed unsafe file handling, which could result in local privilege escalation. (CVE-2016-1240)
* It was discovered that the Tomcat packages installed certain configuration files read by the Tomcat initialization script as writeable to the tomcat group. A member of the group or a malicious web application deployed on Tomcat could use this flaw to escalate their privileges. (CVE-2016-6325)
* The JmxRemoteLifecycleListener was not updated to take account of Oracle's fix for CVE-2016-3427. JMXRemoteLifecycleListener is only included in EWS 2.x and JWS 3.x source distributions. If you deploy a Tomcat instance built from source, using the EWS 2.x, or JWS 3.x distributions, an attacker could use this flaw to launch a remote code execution attack on your deployed instance. (CVE-2016-8735)
* A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long. (CVE-2016-3092)
* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own. (CVE-2016-6816)
* A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body. (CVE-2016-8745)
* The Realm implementations did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder. (CVE-2016-0762)
* It was discovered that a malicious web application could bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications. (CVE-2016-5018)
* It was discovered that when a SecurityManager is configured Tomcat's system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible. (CVE-2016-6794)
* It was discovered that a malicious web application could bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet. (CVE-2016-6796)
* It was discovered that it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not. (CVE-2016-6797)
The CVE-2016-6325 issue was discovered by Red Hat Product Security.
Enhancement(s):
* This enhancement update adds the Red Hat JBoss Web Server 3.1.0. These packages provide a number of enhancements over the previous version of Red Hat JBoss Web Server.
Users of Red Hat JBoss Web Server are advised to upgrade to these updated packages, which add this enhancement.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Web Server.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 3.1.0 serves as a replacement for Red Hat JBoss Web Server 3.0.3, and includes enhancements.\n\nSecurity Fix(es):\n\n* It was reported that the Tomcat init script performed unsafe file handling, which could result in local privilege escalation. (CVE-2016-1240)\n\n* It was discovered that the Tomcat packages installed certain configuration files read by the Tomcat initialization script as writeable to the tomcat group. A member of the group or a malicious web application deployed on Tomcat could use this flaw to escalate their privileges. (CVE-2016-6325)\n\n* The JmxRemoteLifecycleListener was not updated to take account of Oracle\u0027s fix for CVE-2016-3427. JMXRemoteLifecycleListener is only included in EWS 2.x and JWS 3.x source distributions. If you deploy a Tomcat instance built from source, using the EWS 2.x, or JWS 3.x distributions, an attacker could use this flaw to launch a remote code execution attack on your deployed instance. (CVE-2016-8735)\n\n* A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long. (CVE-2016-3092)\n\n* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own. (CVE-2016-6816)\n\n* A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body. (CVE-2016-8745)\n\n* The Realm implementations did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder. (CVE-2016-0762)\n\n* It was discovered that a malicious web application could bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications. (CVE-2016-5018)\n\n* It was discovered that when a SecurityManager is configured Tomcat\u0027s system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible. (CVE-2016-6794)\n\n* It was discovered that a malicious web application could bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet. (CVE-2016-6796)\n\n* It was discovered that it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not. (CVE-2016-6797)\n\nThe CVE-2016-6325 issue was discovered by Red Hat Product Security.\n\nEnhancement(s):\n\n* This enhancement update adds the Red Hat JBoss Web Server 3.1.0. These packages provide a number of enhancements over the previous version of Red Hat JBoss Web Server.\n\nUsers of Red Hat JBoss Web Server are advised to upgrade to these updated packages, which add this enhancement.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0457", "url": "https://access.redhat.com/errata/RHSA-2017:0457" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=webserver\u0026version=3.1.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=webserver\u0026version=3.1.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-US/Red_Hat_JBoss_Web_Server/3/html-single/3.1_Release_Notes/index.html", "url": "https://access.redhat.com/documentation/en-US/Red_Hat_JBoss_Web_Server/3/html-single/3.1_Release_Notes/index.html" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/httpoxy", "url": "https://access.redhat.com/security/vulnerabilities/httpoxy" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2435491", "url": "https://access.redhat.com/solutions/2435491" }, { "category": "external", "summary": "1349468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349468" }, { "category": "external", "summary": "1367447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367447" }, { "category": "external", "summary": "1376712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376712" }, { "category": "external", "summary": "1390493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390493" }, { "category": "external", "summary": "1390515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390515" }, { "category": "external", "summary": "1390520", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390520" }, { "category": "external", "summary": "1390525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390525" }, { "category": "external", "summary": "1390526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390526" }, { "category": "external", "summary": "1397484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397484" }, { "category": "external", "summary": "1397485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397485" }, { "category": "external", "summary": "1403824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403824" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0457.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server security and enhancement update", "tracking": { "current_release_date": "2025-07-07T10:46:16+00:00", "generator": { "date": "2025-07-07T10:46:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.3" } }, "id": "RHSA-2017:0457", "initial_release_date": "2017-03-07T19:05:59+00:00", "revision_history": [ { "date": "2017-03-07T19:05:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-03-07T19:05:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-07T10:46:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 3.1", "product": { "name": "Red Hat JBoss Web Server 3.1", "product_id": "Red Hat JBoss Web Server 3.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:3.1" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-0762", "discovery_date": "2016-10-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1390526" } ], "notes": [ { "category": "description", "text": "The Realm implementations did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: timing attack in Realm implementation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0762" }, { "category": "external", "summary": "RHBZ#1390526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390526" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0762", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0762" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37" } ], "release_date": "2016-10-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:05:59+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0457" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: timing attack in Realm implementation" }, { "cve": "CVE-2016-1240", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2016-09-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1376712" } ], "notes": [ { "category": "description", "text": "It was reported that the Tomcat init script performed unsafe file handling, which could result in local privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: unsafe chown of catalina.log in tomcat init script allows privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1240" }, { "category": "external", "summary": "RHBZ#1376712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376712" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1240", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1240" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1240", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1240" }, { "category": "external", "summary": "http://legalhackers.com/advisories/Tomcat-DebPkgs-Root-Privilege-Escalation-Exploit-CVE-2016-1240.txt", "url": "http://legalhackers.com/advisories/Tomcat-DebPkgs-Root-Privilege-Escalation-Exploit-CVE-2016-1240.txt" } ], "release_date": "2016-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:05:59+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0457" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: unsafe chown of catalina.log in tomcat init script allows privilege escalation" }, { "cve": "CVE-2016-3092", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1349468" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Usage of vulnerable FileUpload package can result in denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3092" }, { "category": "external", "summary": "RHBZ#1349468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349468" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3092", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3092" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3092", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3092" }, { "category": "external", "summary": "http://tomcat.apache.org/security-7.html", "url": "http://tomcat.apache.org/security-7.html" }, { "category": "external", "summary": "http://tomcat.apache.org/security-8.html", "url": "http://tomcat.apache.org/security-8.html" } ], "release_date": "2016-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:05:59+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0457" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Usage of vulnerable FileUpload package can result in denial of service" }, { "cve": "CVE-2016-5018", "discovery_date": "2016-10-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1390525" } ], "notes": [ { "category": "description", "text": "It was discovered that a malicious web application could bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: security manager bypass via IntrospectHelper utility function", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5018" }, { "category": "external", "summary": "RHBZ#1390525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5018", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5018" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5018", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5018" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37" } ], "release_date": "2016-10-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:05:59+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0457" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: security manager bypass via IntrospectHelper utility function" }, { "acknowledgments": [ { "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-6325", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2016-08-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1367447" } ], "notes": [ { "category": "description", "text": "It was discovered that the Tomcat packages installed certain configuration files read by the Tomcat initialization script as writeable to the tomcat group. A member of the group or a malicious web application deployed on Tomcat could use this flaw to escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: tomcat writable config files allow privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6325" }, { "category": "external", "summary": "RHBZ#1367447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367447" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6325", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6325" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6325", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6325" } ], "release_date": "2016-10-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:05:59+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0457" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: tomcat writable config files allow privilege escalation" }, { "cve": "CVE-2016-6794", "discovery_date": "2016-10-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1390520" } ], "notes": [ { "category": "description", "text": "It was discovered that when a SecurityManager was configured, Tomcat\u0027s system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: system property disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6794" }, { "category": "external", "summary": "RHBZ#1390520", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390520" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6794", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6794" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6794", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6794" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37" } ], "release_date": "2016-10-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:05:59+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0457" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: system property disclosure" }, { "cve": "CVE-2016-6796", "discovery_date": "2016-10-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1390515" } ], "notes": [ { "category": "description", "text": "It was discovered that a malicious web application could bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: security manager bypass via JSP Servlet config parameters", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6796" }, { "category": "external", "summary": "RHBZ#1390515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390515" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6796", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6796" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6796", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6796" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37" } ], "release_date": "2016-10-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:05:59+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0457" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: security manager bypass via JSP Servlet config parameters" }, { "cve": "CVE-2016-6797", "discovery_date": "2016-10-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1390493" } ], "notes": [ { "category": "description", "text": "It was discovered that it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: unrestricted access to global resources", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6797" }, { "category": "external", "summary": "RHBZ#1390493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390493" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6797", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6797" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6797", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6797" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37" } ], "release_date": "2016-10-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:05:59+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0457" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: unrestricted access to global resources" }, { "cve": "CVE-2016-6816", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2016-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1397484" } ], "notes": [ { "category": "description", "text": "It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests", "title": "Vulnerability summary" }, { "category": "other", "text": "Applying the fix provided to mitigate this issue may cause Tomcat to return 400 status after updating. For more information, refer to https://access.redhat.com/solutions/2891171", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6816" }, { "category": "external", "summary": "RHBZ#1397484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6816" }, { "category": "external", "summary": "https://access.redhat.com/articles/2991951", "url": "https://access.redhat.com/articles/2991951" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2891171", "url": "https://access.redhat.com/solutions/2891171" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8" } ], "release_date": "2016-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:05:59+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0457" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests" }, { "cve": "CVE-2016-8735", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2016-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1397485" } ], "notes": [ { "category": "description", "text": "The JmxRemoteLifecycleListener was not updated to take account of Oracle\u0027s fix for CVE-2016-3427. JMXRemoteLifecycleListener is only included in EWS 2.x and JWS 3.x source distributions. If you deploy a Tomcat instance built from source, using the EWS 2.x, or JWS 3.x distributions, an attacker could use this flaw to launch a remote code execution attack on your deployed instance.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Remote code execution vulnerability in JmxRemoteLifecycleListener", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8735" }, { "category": "external", "summary": "RHBZ#1397485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397485" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8735", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8735" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8735", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8735" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2016-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:05:59+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0457" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-05-12T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "tomcat: Remote code execution vulnerability in JmxRemoteLifecycleListener" }, { "cve": "CVE-2016-8745", "discovery_date": "2016-12-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1403824" } ], "notes": [ { "category": "description", "text": "A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: information disclosure due to incorrect Processor sharing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8745" }, { "category": "external", "summary": "RHBZ#1403824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403824" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8745", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8745" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8745", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8745" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.49", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.49" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.74", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.74" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.40", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.40" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.9", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.9" } ], "release_date": "2016-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:05:59+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0457" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: information disclosure due to incorrect Processor sharing" } ] }
rhsa-2017:0935
Vulnerability from csaf_redhat
Published
2017-04-12 15:02
Modified
2024-12-01 12:04
Summary
Red Hat Security Advisory: tomcat security update
Notes
Topic
An update for tomcat is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own. (CVE-2016-6816)
Note: This fix causes Tomcat to respond with an HTTP 400 Bad Request error when request contains characters that are not permitted by the HTTP specification to appear not encoded, even though they were previously accepted. The newly introduced system property tomcat.util.http.parser.HttpParser.requestTargetAllow can be used to configure Tomcat to accept curly braces ({ and }) and the pipe symbol (|) in not encoded form, as these are often used in URLs without being properly encoded.
* A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body. (CVE-2016-8745)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tomcat is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nSecurity Fix(es):\n\n* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own. (CVE-2016-6816)\n\nNote: This fix causes Tomcat to respond with an HTTP 400 Bad Request error when request contains characters that are not permitted by the HTTP specification to appear not encoded, even though they were previously accepted. The newly introduced system property tomcat.util.http.parser.HttpParser.requestTargetAllow can be used to configure Tomcat to accept curly braces ({ and }) and the pipe symbol (|) in not encoded form, as these are often used in URLs without being properly encoded. \n\n* A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body. (CVE-2016-8745)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0935", "url": "https://access.redhat.com/errata/RHSA-2017:0935" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1397484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397484" }, { "category": "external", "summary": "1403824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403824" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0935.json" } ], "title": "Red Hat Security Advisory: tomcat security update", "tracking": { "current_release_date": "2024-12-01T12:04:09+00:00", "generator": { "date": "2024-12-01T12:04:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:0935", "initial_release_date": "2017-04-12T15:02:18+00:00", "revision_history": [ { "date": "2017-04-12T15:02:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-04-12T15:02:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-01T12:04:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat-lib-0:7.0.69-11.el7_3.noarch", "product": { "name": "tomcat-lib-0:7.0.69-11.el7_3.noarch", "product_id": "tomcat-lib-0:7.0.69-11.el7_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-lib@7.0.69-11.el7_3?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "product": { "name": "tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "product_id": "tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jsp-2.2-api@7.0.69-11.el7_3?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "product": { "name": "tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "product_id": "tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-el-2.2-api@7.0.69-11.el7_3?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "product": { "name": "tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "product_id": "tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-servlet-3.0-api@7.0.69-11.el7_3?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "product": { "name": "tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "product_id": "tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-admin-webapps@7.0.69-11.el7_3?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-webapps-0:7.0.69-11.el7_3.noarch", "product": { "name": "tomcat-webapps-0:7.0.69-11.el7_3.noarch", "product_id": "tomcat-webapps-0:7.0.69-11.el7_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-webapps@7.0.69-11.el7_3?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-0:7.0.69-11.el7_3.noarch", "product": { "name": "tomcat-0:7.0.69-11.el7_3.noarch", "product_id": "tomcat-0:7.0.69-11.el7_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@7.0.69-11.el7_3?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "product": { "name": "tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "product_id": "tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-docs-webapp@7.0.69-11.el7_3?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "product": { "name": "tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "product_id": "tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jsvc@7.0.69-11.el7_3?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "product": { "name": "tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "product_id": "tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-javadoc@7.0.69-11.el7_3?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "tomcat-0:7.0.69-11.el7_3.src", "product": { "name": "tomcat-0:7.0.69-11.el7_3.src", "product_id": "tomcat-0:7.0.69-11.el7_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@7.0.69-11.el7_3?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.69-11.el7_3.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:tomcat-0:7.0.69-11.el7_3.src" }, "product_reference": "tomcat-0:7.0.69-11.el7_3.src", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-lib-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-webapps-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.69-11.el7_3.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src" }, "product_reference": "tomcat-0:7.0.69-11.el7_3.src", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-lib-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-webapps-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.69-11.el7_3.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:tomcat-0:7.0.69-11.el7_3.src" }, "product_reference": "tomcat-0:7.0.69-11.el7_3.src", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-lib-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-webapps-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.69-11.el7_3.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src" }, "product_reference": "tomcat-0:7.0.69-11.el7_3.src", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-lib-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-webapps-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.69-11.el7_3.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:tomcat-0:7.0.69-11.el7_3.src" }, "product_reference": "tomcat-0:7.0.69-11.el7_3.src", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-lib-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-webapps-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.69-11.el7_3.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src" }, "product_reference": "tomcat-0:7.0.69-11.el7_3.src", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-lib-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-webapps-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.69-11.el7_3.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:tomcat-0:7.0.69-11.el7_3.src" }, "product_reference": "tomcat-0:7.0.69-11.el7_3.src", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-lib-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-webapps-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.69-11.el7_3.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src" }, "product_reference": "tomcat-0:7.0.69-11.el7_3.src", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-lib-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-0:7.0.69-11.el7_3.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch" }, "product_reference": "tomcat-webapps-0:7.0.69-11.el7_3.noarch", "relates_to_product_reference": "7Workstation-optional-7.3.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-6816", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2016-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1397484" } ], "notes": [ { "category": "description", "text": "It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests", "title": "Vulnerability summary" }, { "category": "other", "text": "Applying the fix provided to mitigate this issue may cause Tomcat to return 400 status after updating. For more information, refer to https://access.redhat.com/solutions/2891171", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Client-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Client-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7ComputeNode-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7ComputeNode-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Server-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Server-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Workstation-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Workstation-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6816" }, { "category": "external", "summary": "RHBZ#1397484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6816" }, { "category": "external", "summary": "https://access.redhat.com/articles/2991951", "url": "https://access.redhat.com/articles/2991951" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2891171", "url": "https://access.redhat.com/solutions/2891171" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8" } ], "release_date": "2016-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-04-12T15:02:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Client-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Client-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7ComputeNode-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7ComputeNode-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Server-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Server-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Workstation-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Workstation-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0935" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Client-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Client-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Client-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7ComputeNode-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7ComputeNode-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Server-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Server-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Workstation-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Workstation-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests" }, { "cve": "CVE-2016-8745", "discovery_date": "2016-12-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1403824" } ], "notes": [ { "category": "description", "text": "A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: information disclosure due to incorrect Processor sharing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Client-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Client-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7ComputeNode-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7ComputeNode-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Server-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Server-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Workstation-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Workstation-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8745" }, { "category": "external", "summary": "RHBZ#1403824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403824" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8745", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8745" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8745", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8745" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.49", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.49" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.74", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.74" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.40", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.40" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.9", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.9" } ], "release_date": "2016-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-04-12T15:02:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Client-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Client-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7ComputeNode-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7ComputeNode-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Server-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Server-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Workstation-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Workstation-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0935" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Client-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Client-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Client-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Client-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7ComputeNode-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7ComputeNode-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7ComputeNode-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Server-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Server-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Server-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Server-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Workstation-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Workstation-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-0:7.0.69-11.el7_3.src", "7Workstation-optional-7.3.Z:tomcat-admin-webapps-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-docs-webapp-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-el-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-javadoc-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-jsp-2.2-api-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-jsvc-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-lib-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-servlet-3.0-api-0:7.0.69-11.el7_3.noarch", "7Workstation-optional-7.3.Z:tomcat-webapps-0:7.0.69-11.el7_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: information disclosure due to incorrect Processor sharing" } ] }
rhsa-2017:0250
Vulnerability from csaf_redhat
Published
2017-02-02 21:03
Modified
2025-07-10 09:52
Summary
Red Hat Security Advisory: jboss-ec2-eap security, bug fix, and enhancement update
Notes
Topic
An update for jboss-ec2-eap is now available for Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The jboss-ec2-eap package provide scripts for Red Hat JBoss Enterprise Application Platform running on the Amazon Web Services (AWS) Elastic Compute Cloud (EC2).
With this update, the jboss-ec2-eap package has been updated to ensure compatibility with Red Hat JBoss Enterprise Application Platform 6.4.12.
Security Fix(es):
* It was discovered that the jboss init script performed unsafe file handling which could result in local privilege escalation. (CVE-2016-8656)
* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own. (CVE-2016-6816)
* An EAP feature to download server log files allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user's browser to request the log files consuming enough resources that normal server functioning could be impaired. (CVE-2016-8627)
* It was discovered that when configuring RBAC and marking information as sensitive, users with a Monitor role are able to view the sensitive information. (CVE-2016-7061)
The CVE-2016-8627 issue was discovered by Darran Lofthouse and Brian Stansberry (Red Hat).
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for jboss-ec2-eap is now available for Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The jboss-ec2-eap package provide scripts for Red Hat JBoss Enterprise Application Platform running on the Amazon Web Services (AWS) Elastic Compute Cloud (EC2).\n\nWith this update, the jboss-ec2-eap package has been updated to ensure compatibility with Red Hat JBoss Enterprise Application Platform 6.4.12.\n\nSecurity Fix(es):\n\n* It was discovered that the jboss init script performed unsafe file handling which could result in local privilege escalation. (CVE-2016-8656)\n\n* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own. (CVE-2016-6816)\n\n* An EAP feature to download server log files allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user\u0027s browser to request the log files consuming enough resources that normal server functioning could be impaired. (CVE-2016-8627)\n\n* It was discovered that when configuring RBAC and marking information as sensitive, users with a Monitor role are able to view the sensitive information. (CVE-2016-7061)\n\nThe CVE-2016-8627 issue was discovered by Darran Lofthouse and Brian Stansberry (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0250", "url": "https://access.redhat.com/errata/RHSA-2017:0250" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/", "url": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/" }, { "category": "external", "summary": "1380852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380852" }, { "category": "external", "summary": "1388240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388240" }, { "category": "external", "summary": "1397484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397484" }, { "category": "external", "summary": "1400344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400344" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0250.json" } ], "title": "Red Hat Security Advisory: jboss-ec2-eap security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-07-10T09:52:47+00:00", "generator": { "date": "2025-07-10T09:52:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.3" } }, "id": "RHSA-2017:0250", "initial_release_date": "2017-02-02T21:03:53+00:00", "revision_history": [ { "date": "2017-02-02T21:03:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-02-02T21:03:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-10T09:52:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "jboss-ec2-eap-samples-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch", "product": { "name": "jboss-ec2-eap-samples-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch", "product_id": "jboss-ec2-eap-samples-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-ec2-eap-samples@7.5.13-1.Final_redhat_2.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch", "product": { "name": "jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch", "product_id": "jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-ec2-eap@7.5.13-1.Final_redhat_2.ep6.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.src", "product": { "name": "jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.src", "product_id": "jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-ec2-eap@7.5.13-1.Final_redhat_2.ep6.el6?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch" }, "product_reference": "jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.src" }, "product_reference": "jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-ec2-eap-samples-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-ec2-eap-samples-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch" }, "product_reference": "jboss-ec2-eap-samples-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-6816", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2016-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1397484" } ], "notes": [ { "category": "description", "text": "It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests", "title": "Vulnerability summary" }, { "category": "other", "text": "Applying the fix provided to mitigate this issue may cause Tomcat to return 400 status after updating. For more information, refer to https://access.redhat.com/solutions/2891171", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ec2-eap-samples-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6816" }, { "category": "external", "summary": "RHBZ#1397484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6816" }, { "category": "external", "summary": "https://access.redhat.com/articles/2991951", "url": "https://access.redhat.com/articles/2991951" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2891171", "url": "https://access.redhat.com/solutions/2891171" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8" } ], "release_date": "2016-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-02T21:03:53+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ec2-eap-samples-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0250" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ec2-eap-samples-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests" }, { "cve": "CVE-2016-7061", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2016-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1380852" } ], "notes": [ { "category": "description", "text": "It was discovered that when configuring RBAC and marking information as sensitive, users with a Monitor role are able to view the sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "EAP: Sensitive data can be exposed at the server level in domain mode", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ec2-eap-samples-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7061" }, { "category": "external", "summary": "RHBZ#1380852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380852" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7061", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7061" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7061", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7061" } ], "release_date": "2016-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-02T21:03:53+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ec2-eap-samples-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0250" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ec2-eap-samples-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "EAP: Sensitive data can be exposed at the server level in domain mode" }, { "acknowledgments": [ { "names": [ "Brian Stansberry", "Darran Lofthouse" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-8627", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2016-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388240" } ], "notes": [ { "category": "description", "text": "An EAP feature to download server log files allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user\u0027s browser to request the log files consuming enough resources that normal server functioning could be impaired.", "title": "Vulnerability description" }, { "category": "summary", "text": "admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ec2-eap-samples-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8627" }, { "category": "external", "summary": "RHBZ#1388240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8627", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8627" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8627", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8627" } ], "release_date": "2017-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-02T21:03:53+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ec2-eap-samples-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0250" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ec2-eap-samples-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files" }, { "cve": "CVE-2016-8656", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2016-09-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1400344" } ], "notes": [ { "category": "description", "text": "It was discovered that the jboss init script performed unsafe file handling which could result in local privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "It was found that a variant of the Tomcat CVE-2016-1240 exploit is also applicable to Red Hat JBoss Enterprise Application Platform 5, 6, and 7. CVE-2016-8656 addresses these problems with JBoss EAP. The issue is now corrected in the various versions of Red Hat JBoss Enterprise Application Platform including EAP 6.4.13 and EAP 7.0.5. For further information please refer to https://access.redhat.com/articles/3016681", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ec2-eap-samples-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8656" }, { "category": "external", "summary": "RHBZ#1400344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8656", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8656" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8656", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8656" } ], "release_date": "2016-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-02T21:03:53+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ec2-eap-samples-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0250" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.13-1.Final_redhat_2.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ec2-eap-samples-0:7.5.13-1.Final_redhat_2.ep6.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation" } ] }
rhsa-2017:0244
Vulnerability from csaf_redhat
Published
2017-02-02 20:39
Modified
2025-07-10 09:52
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
Notes
Topic
An update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7.
This release of Red Hat JBoss Enterprise Application Platform 6.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.12, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* It was discovered that the jboss init script performed unsafe file handling which could result in local privilege escalation. (CVE-2016-8656)
* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own. (CVE-2016-6816)
* An EAP feature to download server log files allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user's browser to request the log files consuming enough resources that normal server functioning could be impaired. (CVE-2016-8627)
* It was discovered that when configuring RBAC and marking information as sensitive, users with a Monitor role are able to view the sensitive information. (CVE-2016-7061)
The CVE-2016-8627 issue was discovered by Darran Lofthouse and Brian Stansberry (Red Hat).
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7.\n\nThis release of Red Hat JBoss Enterprise Application Platform 6.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.12, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* It was discovered that the jboss init script performed unsafe file handling which could result in local privilege escalation. (CVE-2016-8656)\n\n* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own. (CVE-2016-6816)\n\n* An EAP feature to download server log files allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user\u0027s browser to request the log files consuming enough resources that normal server functioning could be impaired. (CVE-2016-8627)\n\n* It was discovered that when configuring RBAC and marking information as sensitive, users with a Monitor role are able to view the sensitive information. (CVE-2016-7061)\n\nThe CVE-2016-8627 issue was discovered by Darran Lofthouse and Brian Stansberry (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0244", "url": "https://access.redhat.com/errata/RHSA-2017:0244" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/", "url": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/" }, { "category": "external", "summary": "1380852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380852" }, { "category": "external", "summary": "1388240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388240" }, { "category": "external", "summary": "1397484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397484" }, { "category": "external", "summary": "1400344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400344" }, { "category": "external", "summary": "1401970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401970" }, { "category": "external", "summary": "1403850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403850" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0244.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update", "tracking": { "current_release_date": "2025-07-10T09:52:33+00:00", "generator": { "date": "2025-07-10T09:52:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.3" } }, "id": "RHSA-2017:0244", "initial_release_date": "2017-02-02T20:39:38+00:00", "revision_history": [ { "date": "2017-02-02T20:39:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-02-02T20:39:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-10T09:52:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.src", "product": { "name": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.src", "product_id": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@7.5.20-1.Final_redhat_1.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.src", "product": { "name": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.src", "product_id": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy@2.3.16-1.Final_redhat_1.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "product": { "name": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "product_id": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-console@2.5.15-1.Final_redhat_1.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "product": { "name": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "product_id": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-hal@2.5.15-1.Final_redhat_1.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.src", "product": { "name": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.src", "product_id": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-cxf@2.7.18-5.SP4_redhat_1.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.src", "product": { "name": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.src", "product_id": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/infinispan@5.2.20-1.Final_redhat_1.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.src", "product": { "name": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.src", "product_id": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-ejb-client@1.0.38-1.Final_redhat_1.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.src", "product": { "name": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.src", "product_id": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hornetq@2.3.25-18.SP16_redhat_1.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.src", "product_id": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-javadocs@7.5.13-3.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-transactions@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsr77@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-host-controller@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-platform-mbean@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-core-security@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-naming@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsf@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee-deployment@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jdr@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-process-controller@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-network@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-scanner@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-webservices@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-clustering@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-pojo@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-embedded@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cli@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-security@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxr@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-threads@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-http@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-client-all@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxrs@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-connector@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-configadmin@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-service@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-version@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller-client@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jpa@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-appclient@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-configadmin@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-server@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-messaging@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-sar@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-repository@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jmx@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ejb3@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-remoting@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jacorb@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-logging@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-web@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-modcluster@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-management-client-content@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-management@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-picketlink@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-weld@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-system-jmx@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-xts@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-mail@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cmp@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-protocol@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-welcome-content-eap@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-bundles@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-appclient@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-core@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-product-eap@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_id": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-modules-eap@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "product_id": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-domain@7.5.13-5.Final_redhat_2.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "product": { "name": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "product_id": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-standalone@7.5.13-5.Final_redhat_2.1.ep6.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@7.5.20-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy@2.3.16-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-console@2.5.15-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-hal@2.5.15-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.noarch", "product": { "name": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.noarch", "product_id": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-cxf@2.7.18-5.SP4_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/infinispan-core@5.2.20-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/infinispan-cachestore-jdbc@5.2.20-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/infinispan-cachestore-remote@5.2.20-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/infinispan@5.2.20-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/infinispan-client-hotrod@5.2.20-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-ejb-client@1.0.38-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.noarch", "product": { "name": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.noarch", "product_id": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hornetq@2.3.25-18.SP16_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-javadocs@7.5.13-3.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-transactions@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsr77@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-host-controller@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-platform-mbean@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-core-security@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-naming@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsf@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee-deployment@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jdr@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-process-controller@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-network@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-scanner@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-webservices@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-clustering@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-pojo@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-embedded@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cli@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-security@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxr@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-threads@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-http@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-client-all@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxrs@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-connector@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-configadmin@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-service@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-version@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller-client@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jpa@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-appclient@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-configadmin@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-server@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-messaging@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-sar@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-repository@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jmx@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ejb3@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-remoting@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jacorb@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-logging@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-web@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-modcluster@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-management-client-content@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-management@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-picketlink@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-weld@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-system-jmx@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-xts@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-mail@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cmp@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-protocol@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-welcome-content-eap@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-bundles@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-appclient@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-core@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-product-eap@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-modules-eap@7.5.13-2.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-domain@7.5.13-5.Final_redhat_2.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "product": { "name": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "product_id": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-standalone@7.5.13-5.Final_redhat_2.1.ep6.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.noarch" }, "product_reference": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.src" }, "product_reference": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.noarch" }, "product_reference": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.src" }, "product_reference": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.src" }, "product_reference": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src" }, "product_reference": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.src" }, "product_reference": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src" }, "product_reference": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch" }, "product_reference": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src" }, "product_reference": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.src" }, "product_reference": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.src" }, "product_reference": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-6816", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2016-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1397484" } ], "notes": [ { "category": "description", "text": "It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests", "title": "Vulnerability summary" }, { "category": "other", "text": "Applying the fix provided to mitigate this issue may cause Tomcat to return 400 status after updating. For more information, refer to https://access.redhat.com/solutions/2891171", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6816" }, { "category": "external", "summary": "RHBZ#1397484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6816" }, { "category": "external", "summary": "https://access.redhat.com/articles/2991951", "url": "https://access.redhat.com/articles/2991951" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2891171", "url": "https://access.redhat.com/solutions/2891171" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8" } ], "release_date": "2016-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-02T20:39:38+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0244" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests" }, { "cve": "CVE-2016-7061", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2016-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1380852" } ], "notes": [ { "category": "description", "text": "It was discovered that when configuring RBAC and marking information as sensitive, users with a Monitor role are able to view the sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "EAP: Sensitive data can be exposed at the server level in domain mode", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7061" }, { "category": "external", "summary": "RHBZ#1380852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380852" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7061", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7061" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7061", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7061" } ], "release_date": "2016-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-02T20:39:38+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0244" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "EAP: Sensitive data can be exposed at the server level in domain mode" }, { "acknowledgments": [ { "names": [ "Brian Stansberry", "Darran Lofthouse" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-8627", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2016-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388240" } ], "notes": [ { "category": "description", "text": "An EAP feature to download server log files allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user\u0027s browser to request the log files consuming enough resources that normal server functioning could be impaired.", "title": "Vulnerability description" }, { "category": "summary", "text": "admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8627" }, { "category": "external", "summary": "RHBZ#1388240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8627", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8627" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8627", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8627" } ], "release_date": "2017-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-02T20:39:38+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0244" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files" }, { "cve": "CVE-2016-8656", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2016-09-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1400344" } ], "notes": [ { "category": "description", "text": "It was discovered that the jboss init script performed unsafe file handling which could result in local privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "It was found that a variant of the Tomcat CVE-2016-1240 exploit is also applicable to Red Hat JBoss Enterprise Application Platform 5, 6, and 7. CVE-2016-8656 addresses these problems with JBoss EAP. The issue is now corrected in the various versions of Red Hat JBoss Enterprise Application Platform including EAP 6.4.13 and EAP 7.0.5. For further information please refer to https://access.redhat.com/articles/3016681", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8656" }, { "category": "external", "summary": "RHBZ#1400344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8656", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8656" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8656", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8656" } ], "release_date": "2016-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-02T20:39:38+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0244" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el6.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation" } ] }
rhsa-2017:0527
Vulnerability from csaf_redhat
Published
2017-03-15 13:01
Modified
2024-12-01 12:03
Summary
Red Hat Security Advisory: tomcat6 security update
Notes
Topic
An update for tomcat6 is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own. (CVE-2016-6816)
Note: This fix causes Tomcat to respond with an HTTP 400 Bad Request error when request contains characters that are not permitted by the HTTP specification to appear not encoded, even though they were previously accepted. The newly introduced system property tomcat.util.http.parser.HttpParser.requestTargetAllow can be used to configure Tomcat to accept curly braces ({ and }) and the pipe symbol (|) in not encoded form, as these are often used in URLs without being properly encoded.
* A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body. (CVE-2016-8745)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tomcat6 is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nSecurity Fix(es):\n\n* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own. (CVE-2016-6816)\n\nNote: This fix causes Tomcat to respond with an HTTP 400 Bad Request error when request contains characters that are not permitted by the HTTP specification to appear not encoded, even though they were previously accepted. The newly introduced system property tomcat.util.http.parser.HttpParser.requestTargetAllow can be used to configure Tomcat to accept curly braces ({ and }) and the pipe symbol (|) in not encoded form, as these are often used in URLs without being properly encoded. \n\n* A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body. (CVE-2016-8745)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0527", "url": "https://access.redhat.com/errata/RHSA-2017:0527" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1397484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397484" }, { "category": "external", "summary": "1403824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403824" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0527.json" } ], "title": "Red Hat Security Advisory: tomcat6 security update", "tracking": { "current_release_date": "2024-12-01T12:03:58+00:00", "generator": { "date": "2024-12-01T12:03:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:0527", "initial_release_date": "2017-03-15T13:01:42+00:00", "revision_history": [ { "date": "2017-03-15T13:01:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-03-15T13:01:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-01T12:03:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "product": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "product_id": "tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.24-105.el6_8?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.24-105.el6_8.noarch", "product": { "name": "tomcat6-0:6.0.24-105.el6_8.noarch", "product_id": "tomcat6-0:6.0.24-105.el6_8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.24-105.el6_8?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-lib-0:6.0.24-105.el6_8.noarch", "product": { "name": "tomcat6-lib-0:6.0.24-105.el6_8.noarch", "product_id": "tomcat6-lib-0:6.0.24-105.el6_8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.24-105.el6_8?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "product": { "name": "tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "product_id": "tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.24-105.el6_8?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "product": { "name": "tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "product_id": "tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.24-105.el6_8?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "product": { "name": "tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "product_id": "tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.24-105.el6_8?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "product": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "product_id": "tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.24-105.el6_8?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "product": { "name": "tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "product_id": "tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-el-2.1-api@6.0.24-105.el6_8?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "product": { "name": "tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "product_id": "tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.24-105.el6_8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "tomcat6-0:6.0.24-105.el6_8.src", "product": { "name": "tomcat6-0:6.0.24-105.el6_8.src", "product_id": "tomcat6-0:6.0.24-105.el6_8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.24-105.el6_8?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-105.el6_8.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src" }, "product_reference": "tomcat6-0:6.0.24-105.el6_8.src", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-105.el6_8.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src" }, "product_reference": "tomcat6-0:6.0.24-105.el6_8.src", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-105.el6_8.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:tomcat6-0:6.0.24-105.el6_8.src" }, "product_reference": "tomcat6-0:6.0.24-105.el6_8.src", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-105.el6_8.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src" }, "product_reference": "tomcat6-0:6.0.24-105.el6_8.src", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-105.el6_8.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:tomcat6-0:6.0.24-105.el6_8.src" }, "product_reference": "tomcat6-0:6.0.24-105.el6_8.src", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-105.el6_8.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src" }, "product_reference": "tomcat6-0:6.0.24-105.el6_8.src", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-105.el6_8.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-6816", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2016-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1397484" } ], "notes": [ { "category": "description", "text": "It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests", "title": "Vulnerability summary" }, { "category": "other", "text": "Applying the fix provided to mitigate this issue may cause Tomcat to return 400 status after updating. For more information, refer to https://access.redhat.com/solutions/2891171", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Client-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6ComputeNode-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Server-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Server-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Workstation-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Workstation-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6816" }, { "category": "external", "summary": "RHBZ#1397484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6816" }, { "category": "external", "summary": "https://access.redhat.com/articles/2991951", "url": "https://access.redhat.com/articles/2991951" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2891171", "url": "https://access.redhat.com/solutions/2891171" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8" } ], "release_date": "2016-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-15T13:01:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Client-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6ComputeNode-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Server-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Server-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Workstation-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Workstation-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0527" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "6Client-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Client-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6ComputeNode-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Server-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Server-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Workstation-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Workstation-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests" }, { "cve": "CVE-2016-8745", "discovery_date": "2016-12-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1403824" } ], "notes": [ { "category": "description", "text": "A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: information disclosure due to incorrect Processor sharing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Client-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6ComputeNode-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Server-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Server-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Workstation-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Workstation-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8745" }, { "category": "external", "summary": "RHBZ#1403824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403824" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8745", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8745" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8745", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8745" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.49", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.49" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.74", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.74" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.40", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.40" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.9", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.9" } ], "release_date": "2016-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-15T13:01:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Client-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6ComputeNode-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Server-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Server-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Workstation-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Workstation-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0527" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Client-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Client-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6ComputeNode-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6ComputeNode-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Server-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Server-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Server-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Server-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Workstation-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Workstation-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-0:6.0.24-105.el6_8.src", "6Workstation-optional-6.8.z:tomcat6-admin-webapps-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-docs-webapp-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-el-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-javadoc-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-jsp-2.1-api-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-lib-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-servlet-2.5-api-0:6.0.24-105.el6_8.noarch", "6Workstation-optional-6.8.z:tomcat6-webapps-0:6.0.24-105.el6_8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: information disclosure due to incorrect Processor sharing" } ] }
rhsa-2017:0246
Vulnerability from csaf_redhat
Published
2017-02-02 20:33
Modified
2025-07-10 09:52
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
Notes
Topic
An update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7.
This release of Red Hat JBoss Enterprise Application Platform 6.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.12, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* It was discovered that the jboss init script performed unsafe file handling which could result in local privilege escalation. (CVE-2016-8656)
* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own. (CVE-2016-6816)
* An EAP feature to download server log files allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user's browser to request the log files consuming enough resources that normal server functioning could be impaired. (CVE-2016-8627)
* It was discovered that when configuring RBAC and marking information as sensitive, users with a Monitor role are able to view the sensitive information. (CVE-2016-7061)
The CVE-2016-8627 issue was discovered by Darran Lofthouse and Brian Stansberry (Red Hat).
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7.\n\nThis release of Red Hat JBoss Enterprise Application Platform 6.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.12, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* It was discovered that the jboss init script performed unsafe file handling which could result in local privilege escalation. (CVE-2016-8656)\n\n* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own. (CVE-2016-6816)\n\n* An EAP feature to download server log files allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user\u0027s browser to request the log files consuming enough resources that normal server functioning could be impaired. (CVE-2016-8627)\n\n* It was discovered that when configuring RBAC and marking information as sensitive, users with a Monitor role are able to view the sensitive information. (CVE-2016-7061)\n\nThe CVE-2016-8627 issue was discovered by Darran Lofthouse and Brian Stansberry (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0246", "url": "https://access.redhat.com/errata/RHSA-2017:0246" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/", "url": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/" }, { "category": "external", "summary": "1380852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380852" }, { "category": "external", "summary": "1388240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388240" }, { "category": "external", "summary": "1397484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397484" }, { "category": "external", "summary": "1400344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400344" }, { "category": "external", "summary": "1401971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401971" }, { "category": "external", "summary": "1403851", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403851" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0246.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update", "tracking": { "current_release_date": "2025-07-10T09:52:27+00:00", "generator": { "date": "2025-07-10T09:52:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.3" } }, "id": "RHSA-2017:0246", "initial_release_date": "2017-02-02T20:33:58+00:00", "revision_history": [ { "date": "2017-02-02T20:33:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-02-02T20:33:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-10T09:52:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.src", "product": { "name": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.src", "product_id": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@7.5.20-1.Final_redhat_1.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.src", "product": { "name": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.src", "product_id": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy@2.3.16-1.Final_redhat_1.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "product": { "name": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "product_id": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-console@2.5.15-1.Final_redhat_1.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "product": { "name": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "product_id": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-hal@2.5.15-1.Final_redhat_1.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.src", "product": { "name": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.src", "product_id": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-cxf@2.7.18-5.SP4_redhat_1.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.src", "product": { "name": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.src", "product_id": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/infinispan@5.2.20-1.Final_redhat_1.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.src", "product": { "name": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.src", "product_id": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-ejb-client@1.0.38-1.Final_redhat_1.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.src", "product": { "name": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.src", "product_id": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hornetq@2.3.25-18.SP16_redhat_1.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.src", "product_id": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-javadocs@7.5.13-3.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ejb3@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cmp@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-platform-mbean@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-messaging@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-transactions@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-http@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-version@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cli@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jacorb@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-remoting@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-sar@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-appclient@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-scanner@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-web@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-embedded@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsf@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jdr@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-host-controller@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-mail@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-threads@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-server@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-weld@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-naming@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-webservices@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-picketlink@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-management@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller-client@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-configadmin@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxrs@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-clustering@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-xts@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-client-all@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-network@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-repository@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-security@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-logging@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-modcluster@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsr77@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-configadmin@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-system-jmx@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-pojo@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxr@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee-deployment@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jpa@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-service@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jmx@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-connector@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-core-security@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-process-controller@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-management-client-content@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-protocol@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-welcome-content-eap@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-core@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-appclient@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-product-eap@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-bundles@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_id": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-modules-eap@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "product_id": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-standalone@7.5.13-5.Final_redhat_2.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "product": { "name": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "product_id": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-domain@7.5.13-5.Final_redhat_2.1.ep6.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@7.5.20-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/resteasy@2.3.16-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-console@2.5.15-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-hal@2.5.15-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.noarch", "product": { "name": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.noarch", "product_id": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-cxf@2.7.18-5.SP4_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/infinispan@5.2.20-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/infinispan-cachestore-remote@5.2.20-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/infinispan-cachestore-jdbc@5.2.20-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/infinispan-core@5.2.20-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/infinispan-client-hotrod@5.2.20-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-ejb-client@1.0.38-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.noarch", "product": { "name": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.noarch", "product_id": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hornetq@2.3.25-18.SP16_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-javadocs@7.5.13-3.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ejb3@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cmp@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-platform-mbean@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-messaging@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-transactions@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-http@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-version@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cli@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jacorb@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-remoting@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-sar@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-appclient@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-scanner@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-web@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-embedded@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsf@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jdr@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-host-controller@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-mail@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-threads@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-server@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-weld@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-naming@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-webservices@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-picketlink@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-management@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller-client@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-configadmin@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxrs@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-clustering@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-xts@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-client-all@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-network@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-repository@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-security@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-logging@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-modcluster@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsr77@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-configadmin@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-system-jmx@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-pojo@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxr@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee-deployment@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jpa@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-service@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jmx@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-connector@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-core-security@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-process-controller@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-management-client-content@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-protocol@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-welcome-content-eap@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-core@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-appclient@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-product-eap@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-bundles@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-modules-eap@7.5.13-2.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-standalone@7.5.13-5.Final_redhat_2.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "product": { "name": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "product_id": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-domain@7.5.13-5.Final_redhat_2.1.ep6.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.noarch" }, "product_reference": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.src" }, "product_reference": "apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.noarch" }, "product_reference": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.src" }, "product_reference": "hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.src" }, "product_reference": "infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src" }, "product_reference": "jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.src" }, "product_reference": "jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src" }, "product_reference": "jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch" }, "product_reference": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src" }, "product_reference": "jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.src" }, "product_reference": "jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.src" }, "product_reference": "resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-6816", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2016-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1397484" } ], "notes": [ { "category": "description", "text": "It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests", "title": "Vulnerability summary" }, { "category": "other", "text": "Applying the fix provided to mitigate this issue may cause Tomcat to return 400 status after updating. For more information, refer to https://access.redhat.com/solutions/2891171", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6816" }, { "category": "external", "summary": "RHBZ#1397484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6816" }, { "category": "external", "summary": "https://access.redhat.com/articles/2991951", "url": "https://access.redhat.com/articles/2991951" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2891171", "url": "https://access.redhat.com/solutions/2891171" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8" } ], "release_date": "2016-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-02T20:33:58+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests" }, { "cve": "CVE-2016-7061", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2016-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1380852" } ], "notes": [ { "category": "description", "text": "It was discovered that when configuring RBAC and marking information as sensitive, users with a Monitor role are able to view the sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "EAP: Sensitive data can be exposed at the server level in domain mode", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7061" }, { "category": "external", "summary": "RHBZ#1380852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380852" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7061", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7061" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7061", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7061" } ], "release_date": "2016-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-02T20:33:58+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "EAP: Sensitive data can be exposed at the server level in domain mode" }, { "acknowledgments": [ { "names": [ "Brian Stansberry", "Darran Lofthouse" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-8627", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2016-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388240" } ], "notes": [ { "category": "description", "text": "An EAP feature to download server log files allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user\u0027s browser to request the log files consuming enough resources that normal server functioning could be impaired.", "title": "Vulnerability description" }, { "category": "summary", "text": "admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8627" }, { "category": "external", "summary": "RHBZ#1388240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8627", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8627" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8627", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8627" } ], "release_date": "2017-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-02T20:33:58+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files" }, { "cve": "CVE-2016-8656", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2016-09-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1400344" } ], "notes": [ { "category": "description", "text": "It was discovered that the jboss init script performed unsafe file handling which could result in local privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "It was found that a variant of the Tomcat CVE-2016-1240 exploit is also applicable to Red Hat JBoss Enterprise Application Platform 5, 6, and 7. CVE-2016-8656 addresses these problems with JBoss EAP. The issue is now corrected in the various versions of Red Hat JBoss Enterprise Application Platform including EAP 6.4.13 and EAP 7.0.5. For further information please refer to https://access.redhat.com/articles/3016681", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8656" }, { "category": "external", "summary": "RHBZ#1400344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8656", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8656" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8656", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8656" } ], "release_date": "2016-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-02T20:33:58+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0246" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:apache-cxf-0:2.7.18-5.SP4_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-18.SP16_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-0:5.2.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:infinispan-cachestore-jdbc-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-cachestore-remote-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-client-hotrod-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:infinispan-core-0:5.2.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.38-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-hal-0:2.5.15-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-core-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.13-3.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.13-5.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.13-2.Final_redhat_2.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossweb-0:7.5.20-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:resteasy-0:2.3.16-1.Final_redhat_1.1.ep6.el5.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation" } ] }
rhsa-2017:0455
Vulnerability from csaf_redhat
Published
2017-03-07 19:06
Modified
2025-07-07 10:46
Summary
Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 security and enhancement update
Notes
Topic
An update is now available for Red Hat JBoss Web Server 3 for RHEL 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.
This release of Red Hat JBoss Web Server 3.1.0 serves as a replacement for Red Hat JBoss Web Server 3.0.3, and includes enhancements.
Security Fix(es):
* It was reported that the Tomcat init script performed unsafe file handling, which could result in local privilege escalation. (CVE-2016-1240)
* It was discovered that the Tomcat packages installed certain configuration files read by the Tomcat initialization script as writeable to the tomcat group. A member of the group or a malicious web application deployed on Tomcat could use this flaw to escalate their privileges. (CVE-2016-6325)
* The JmxRemoteLifecycleListener was not updated to take account of Oracle's fix for CVE-2016-3427. JMXRemoteLifecycleListener is only included in EWS 2.x and JWS 3.x source distributions. If you deploy a Tomcat instance built from source, using the EWS 2.x, or JWS 3.x distributions, an attacker could use this flaw to launch a remote code execution attack on your deployed instance. (CVE-2016-8735)
* A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long. (CVE-2016-3092)
* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own. (CVE-2016-6816)
* A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body. (CVE-2016-8745)
* The Realm implementations did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder. (CVE-2016-0762)
* It was discovered that a malicious web application could bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications. (CVE-2016-5018)
* It was discovered that when a SecurityManager is configured Tomcat's system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible. (CVE-2016-6794)
* It was discovered that a malicious web application could bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet. (CVE-2016-6796)
* It was discovered that it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not. (CVE-2016-6797)
The CVE-2016-6325 issue was discovered by Red Hat Product Security.
Enhancement(s):
This enhancement update adds the Red Hat JBoss Web Server 3.1.0 packages to Red Hat Enterprise Linux 6. These packages provide a number of enhancements over the previous version of Red Hat JBoss Web Server. (JIRA#JWS-267)
Users of Red Hat JBoss Web Server are advised to upgrade to these updated packages, which add this enhancement.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Web Server 3 for RHEL 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 3.1.0 serves as a replacement for Red Hat JBoss Web Server 3.0.3, and includes enhancements.\n\nSecurity Fix(es):\n\n* It was reported that the Tomcat init script performed unsafe file handling, which could result in local privilege escalation. (CVE-2016-1240)\n\n* It was discovered that the Tomcat packages installed certain configuration files read by the Tomcat initialization script as writeable to the tomcat group. A member of the group or a malicious web application deployed on Tomcat could use this flaw to escalate their privileges. (CVE-2016-6325)\n\n* The JmxRemoteLifecycleListener was not updated to take account of Oracle\u0027s fix for CVE-2016-3427. JMXRemoteLifecycleListener is only included in EWS 2.x and JWS 3.x source distributions. If you deploy a Tomcat instance built from source, using the EWS 2.x, or JWS 3.x distributions, an attacker could use this flaw to launch a remote code execution attack on your deployed instance. (CVE-2016-8735)\n\n* A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long. (CVE-2016-3092)\n\n* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own. (CVE-2016-6816)\n\n* A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body. (CVE-2016-8745)\n\n* The Realm implementations did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder. (CVE-2016-0762)\n\n* It was discovered that a malicious web application could bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications. (CVE-2016-5018)\n\n* It was discovered that when a SecurityManager is configured Tomcat\u0027s system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible. (CVE-2016-6794)\n\n* It was discovered that a malicious web application could bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet. (CVE-2016-6796)\n\n* It was discovered that it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not. (CVE-2016-6797)\n\nThe CVE-2016-6325 issue was discovered by Red Hat Product Security.\n\nEnhancement(s):\n\nThis enhancement update adds the Red Hat JBoss Web Server 3.1.0 packages to Red Hat Enterprise Linux 6. These packages provide a number of enhancements over the previous version of Red Hat JBoss Web Server. (JIRA#JWS-267)\n\nUsers of Red Hat JBoss Web Server are advised to upgrade to these updated packages, which add this enhancement.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0455", "url": "https://access.redhat.com/errata/RHSA-2017:0455" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1349468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349468" }, { "category": "external", "summary": "1367447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367447" }, { "category": "external", "summary": "1376712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376712" }, { "category": "external", "summary": "1390493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390493" }, { "category": "external", "summary": "1390515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390515" }, { "category": "external", "summary": "1390520", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390520" }, { "category": "external", "summary": "1390525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390525" }, { "category": "external", "summary": "1390526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390526" }, { "category": "external", "summary": "1397484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397484" }, { "category": "external", "summary": "1397485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397485" }, { "category": "external", "summary": "1403824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403824" }, { "category": "external", "summary": "JWS-267", "url": "https://issues.redhat.com/browse/JWS-267" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0455.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 security and enhancement update", "tracking": { "current_release_date": "2025-07-07T10:46:04+00:00", "generator": { "date": "2025-07-07T10:46:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.3" } }, "id": "RHSA-2017:0455", "initial_release_date": "2017-03-07T19:06:40+00:00", "revision_history": [ { "date": "2017-03-07T19:06:40+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-03-07T19:06:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-07T10:46:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 3.1 for RHEL 6", "product": { "name": "Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" }, { "branches": [ { "category": "product_version", "name": "hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-envers-eap6@4.2.23-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-c3p0-eap6@4.2.23-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-core-eap6@4.2.23-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-eap6@4.2.23-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-entitymanager-eap6@4.2.23-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "product": { "name": "mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "product_id": "mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster@1.3.5-2.Final_redhat_2.1.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "product": { "name": "mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "product_id": "mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-tomcat7@1.3.5-2.Final_redhat_2.1.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "product": { "name": "mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "product_id": "mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-tomcat8@1.3.5-2.Final_redhat_2.1.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "product": { "name": "jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "product_id": "jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon@1.0.15-1.redhat_2.1.jbcs.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "product": { "name": "jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "product_id": "jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-runtime@1-3.jbcs.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "product": { "name": "tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "product_id": "tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-vault@1.0.8-9.Final_redhat_2.1.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "product": { "name": "tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "product_id": "tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-jsvc@7.0.70-16.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "product": { "name": "tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "product_id": "tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-selinux@7.0.70-16.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "product": { "name": "tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "product_id": "tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.70-16.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "product": { "name": "tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "product_id": "tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.70-16.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "product": { "name": "tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "product_id": "tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-el-2.2-api@7.0.70-16.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "product": { "name": "tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "product_id": "tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.70-16.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "product": { "name": "tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "product_id": "tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.70-16.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "product": { "name": "tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "product_id": "tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.70-16.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-0:7.0.70-16.ep7.el6.noarch", "product": { "name": "tomcat7-0:7.0.70-16.ep7.el6.noarch", "product_id": "tomcat7-0:7.0.70-16.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7@7.0.70-16.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "product": { "name": "tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "product_id": "tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-lib@7.0.70-16.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "product": { "name": "tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "product_id": "tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.70-16.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "product": { "name": "tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "product_id": "tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.70-16.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "product": { "name": "tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "product_id": "tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-log4j@8.0.36-17.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-0:8.0.36-17.ep7.el6.noarch", "product": { "name": "tomcat8-0:8.0.36-17.ep7.el6.noarch", "product_id": "tomcat8-0:8.0.36-17.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8@8.0.36-17.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "product": { "name": "tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "product_id": "tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-admin-webapps@8.0.36-17.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "product": { "name": "tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "product_id": "tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-jsvc@8.0.36-17.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "product": { "name": "tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "product_id": "tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-el-2.2-api@8.0.36-17.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "product": { "name": "tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "product_id": "tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-docs-webapp@8.0.36-17.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "product": { "name": "tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "product_id": "tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-servlet-3.1-api@8.0.36-17.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch", "product": { "name": "tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch", "product_id": "tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-webapps@8.0.36-17.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "product": { "name": "tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "product_id": "tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-selinux@8.0.36-17.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "product": { "name": "tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "product_id": "tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-jsp-2.3-api@8.0.36-17.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "product": { "name": "tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "product_id": "tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-lib@8.0.36-17.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "product": { "name": "tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "product_id": "tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-javadoc@8.0.36-17.ep7.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "product": { "name": "hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "product_id": "hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-eap6@4.2.23-1.Final_redhat_1.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "product": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "product_id": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon-jsvc@1.0.15-17.redhat_2.jbcs.el6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "product": { "name": "mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "product_id": "mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster@1.3.5-2.Final_redhat_2.1.ep7.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "product": { "name": "jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "product_id": "jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon@1.0.15-1.redhat_2.1.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "product": { "name": "tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "product_id": "tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-vault@1.0.8-9.Final_redhat_2.1.ep7.el6?arch=src" } } }, { "category": "product_version", "name": "tomcat7-0:7.0.70-16.ep7.el6.src", "product": { "name": "tomcat7-0:7.0.70-16.ep7.el6.src", "product_id": "tomcat7-0:7.0.70-16.ep7.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7@7.0.70-16.ep7.el6?arch=src" } } }, { "category": "product_version", "name": "tomcat8-0:8.0.36-17.ep7.el6.src", "product": { "name": "tomcat8-0:8.0.36-17.ep7.el6.src", "product_id": "tomcat8-0:8.0.36-17.ep7.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8@8.0.36-17.ep7.el6?arch=src" } } }, { "category": "product_version", "name": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "product": { "name": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "product_id": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.2.8-9.redhat_9.ep7.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo@1.0.15-17.redhat_2.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon-jsvc@1.0.15-17.redhat_2.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "product": { "name": "tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "product_id": "tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.2.8-9.redhat_9.ep7.el6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "product": { "name": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "product_id": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.2.8-9.redhat_9.ep7.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "product_id": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo@1.0.15-17.redhat_2.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "product_id": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon-jsvc@1.0.15-17.redhat_2.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "product": { "name": "tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "product_id": "tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.2.8-9.redhat_9.ep7.el6?arch=i686" } } }, { "category": "product_version", "name": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "product": { "name": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "product_id": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.2.8-9.redhat_9.ep7.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src" }, "product_reference": "hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686 as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686 as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch" }, "product_reference": "jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch" }, "product_reference": "mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src" }, "product_reference": "mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch" }, "product_reference": "mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch" }, "product_reference": "mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686 as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686" }, "product_reference": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src" }, "product_reference": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64" }, "product_reference": "tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686 as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686" }, "product_reference": "tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64" }, "product_reference": "tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch" }, "product_reference": "tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src" }, "product_reference": "tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-0:7.0.70-16.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch" }, "product_reference": "tomcat7-0:7.0.70-16.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-0:7.0.70-16.ep7.el6.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src" }, "product_reference": "tomcat7-0:7.0.70-16.ep7.el6.src", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch" }, "product_reference": "tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch" }, "product_reference": "tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch" }, "product_reference": "tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch" }, "product_reference": "tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch" }, "product_reference": "tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch" }, "product_reference": "tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-lib-0:7.0.70-16.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch" }, "product_reference": "tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch" }, "product_reference": "tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch" }, "product_reference": "tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch" }, "product_reference": "tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch" }, "product_reference": "tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-0:8.0.36-17.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch" }, "product_reference": "tomcat8-0:8.0.36-17.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-0:8.0.36-17.ep7.el6.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src" }, "product_reference": "tomcat8-0:8.0.36-17.ep7.el6.src", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch" }, "product_reference": "tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch" }, "product_reference": "tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch" }, "product_reference": "tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch" }, "product_reference": "tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch" }, "product_reference": "tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch" }, "product_reference": "tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-lib-0:8.0.36-17.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch" }, "product_reference": "tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch" }, "product_reference": "tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch" }, "product_reference": "tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch" }, "product_reference": "tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" }, "product_reference": "tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-0762", "discovery_date": "2016-10-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1390526" } ], "notes": [ { "category": "description", "text": "The Realm implementations did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: timing attack in Realm implementation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0762" }, { "category": "external", "summary": "RHBZ#1390526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390526" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0762", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0762" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37" } ], "release_date": "2016-10-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:06:40+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: timing attack in Realm implementation" }, { "cve": "CVE-2016-1240", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2016-09-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1376712" } ], "notes": [ { "category": "description", "text": "It was reported that the Tomcat init script performed unsafe file handling, which could result in local privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: unsafe chown of catalina.log in tomcat init script allows privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1240" }, { "category": "external", "summary": "RHBZ#1376712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376712" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1240", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1240" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1240", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1240" }, { "category": "external", "summary": "http://legalhackers.com/advisories/Tomcat-DebPkgs-Root-Privilege-Escalation-Exploit-CVE-2016-1240.txt", "url": "http://legalhackers.com/advisories/Tomcat-DebPkgs-Root-Privilege-Escalation-Exploit-CVE-2016-1240.txt" } ], "release_date": "2016-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:06:40+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: unsafe chown of catalina.log in tomcat init script allows privilege escalation" }, { "cve": "CVE-2016-3092", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1349468" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Usage of vulnerable FileUpload package can result in denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3092" }, { "category": "external", "summary": "RHBZ#1349468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349468" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3092", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3092" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3092", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3092" }, { "category": "external", "summary": "http://tomcat.apache.org/security-7.html", "url": "http://tomcat.apache.org/security-7.html" }, { "category": "external", "summary": "http://tomcat.apache.org/security-8.html", "url": "http://tomcat.apache.org/security-8.html" } ], "release_date": "2016-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:06:40+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Usage of vulnerable FileUpload package can result in denial of service" }, { "cve": "CVE-2016-5018", "discovery_date": "2016-10-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1390525" } ], "notes": [ { "category": "description", "text": "It was discovered that a malicious web application could bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: security manager bypass via IntrospectHelper utility function", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5018" }, { "category": "external", "summary": "RHBZ#1390525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5018", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5018" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5018", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5018" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37" } ], "release_date": "2016-10-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:06:40+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: security manager bypass via IntrospectHelper utility function" }, { "acknowledgments": [ { "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-6325", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2016-08-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1367447" } ], "notes": [ { "category": "description", "text": "It was discovered that the Tomcat packages installed certain configuration files read by the Tomcat initialization script as writeable to the tomcat group. A member of the group or a malicious web application deployed on Tomcat could use this flaw to escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: tomcat writable config files allow privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6325" }, { "category": "external", "summary": "RHBZ#1367447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367447" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6325", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6325" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6325", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6325" } ], "release_date": "2016-10-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:06:40+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: tomcat writable config files allow privilege escalation" }, { "cve": "CVE-2016-6794", "discovery_date": "2016-10-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1390520" } ], "notes": [ { "category": "description", "text": "It was discovered that when a SecurityManager was configured, Tomcat\u0027s system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: system property disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6794" }, { "category": "external", "summary": "RHBZ#1390520", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390520" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6794", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6794" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6794", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6794" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37" } ], "release_date": "2016-10-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:06:40+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: system property disclosure" }, { "cve": "CVE-2016-6796", "discovery_date": "2016-10-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1390515" } ], "notes": [ { "category": "description", "text": "It was discovered that a malicious web application could bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: security manager bypass via JSP Servlet config parameters", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6796" }, { "category": "external", "summary": "RHBZ#1390515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390515" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6796", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6796" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6796", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6796" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37" } ], "release_date": "2016-10-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:06:40+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: security manager bypass via JSP Servlet config parameters" }, { "cve": "CVE-2016-6797", "discovery_date": "2016-10-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1390493" } ], "notes": [ { "category": "description", "text": "It was discovered that it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: unrestricted access to global resources", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6797" }, { "category": "external", "summary": "RHBZ#1390493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390493" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6797", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6797" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6797", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6797" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37" } ], "release_date": "2016-10-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:06:40+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: unrestricted access to global resources" }, { "cve": "CVE-2016-6816", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2016-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1397484" } ], "notes": [ { "category": "description", "text": "It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests", "title": "Vulnerability summary" }, { "category": "other", "text": "Applying the fix provided to mitigate this issue may cause Tomcat to return 400 status after updating. For more information, refer to https://access.redhat.com/solutions/2891171", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6816" }, { "category": "external", "summary": "RHBZ#1397484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6816" }, { "category": "external", "summary": "https://access.redhat.com/articles/2991951", "url": "https://access.redhat.com/articles/2991951" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2891171", "url": "https://access.redhat.com/solutions/2891171" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8" } ], "release_date": "2016-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:06:40+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests" }, { "cve": "CVE-2016-8735", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2016-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1397485" } ], "notes": [ { "category": "description", "text": "The JmxRemoteLifecycleListener was not updated to take account of Oracle\u0027s fix for CVE-2016-3427. JMXRemoteLifecycleListener is only included in EWS 2.x and JWS 3.x source distributions. If you deploy a Tomcat instance built from source, using the EWS 2.x, or JWS 3.x distributions, an attacker could use this flaw to launch a remote code execution attack on your deployed instance.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Remote code execution vulnerability in JmxRemoteLifecycleListener", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8735" }, { "category": "external", "summary": "RHBZ#1397485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397485" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8735", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8735" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8735", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8735" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2016-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:06:40+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-05-12T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "tomcat: Remote code execution vulnerability in JmxRemoteLifecycleListener" }, { "cve": "CVE-2016-8745", "discovery_date": "2016-12-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1403824" } ], "notes": [ { "category": "description", "text": "A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: information disclosure due to incorrect Processor sharing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8745" }, { "category": "external", "summary": "RHBZ#1403824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403824" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8745", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8745" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8745", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8745" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.49", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.49" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.74", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.74" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.40", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.40" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.9", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.9" } ], "release_date": "2016-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-07T19:06:40+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-JWS-3.1:hibernate4-c3p0-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-core-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.src", "6Server-JWS-3.1:hibernate4-entitymanager-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:hibernate4-envers-eap6-0:4.2.23-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.noarch", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-0:1.0.15-1.redhat_2.1.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.src", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.i686", "6Server-JWS-3.1:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.0.15-17.redhat_2.jbcs.el6.x86_64", "6Server-JWS-3.1:jbcs-httpd24-runtime-0:1-3.jbcs.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.5-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.5-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-9.redhat_9.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.0.8-9.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-16.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-16.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-17.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-17.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-17.ep7.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: information disclosure due to incorrect Processor sharing" } ] }
rhsa-2017:0247
Vulnerability from csaf_redhat
Published
2017-02-02 20:23
Modified
2025-01-26 20:04
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
Notes
Topic
An update is now available for Red Hat JBoss Enterprise Application Platform.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7.
This release of Red Hat JBoss Enterprise Application Platform 6.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.12, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
[Updated May 2, 2017]
CVE-2016-8656 was originally listed as resolved with this erratum. However, this was incorrect, as that issue only affected RPM installations and not zip files as provided by this erratum.
Security Fix(es):
* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own. (CVE-2016-6816)
* An EAP feature to download server log files allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user's browser to request the log files consuming enough resources that normal server functioning could be impaired. (CVE-2016-8627)
* It was discovered that when configuring RBAC and marking information as sensitive, users with a Monitor role are able to view the sensitive information. (CVE-2016-7061)
The CVE-2016-8627 issue was discovered by Darran Lofthouse and Brian Stansberry (Red Hat).
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7.\n\nThis release of Red Hat JBoss Enterprise Application Platform 6.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.12, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\n[Updated May 2, 2017]\nCVE-2016-8656 was originally listed as resolved with this erratum. However, this was incorrect, as that issue only affected RPM installations and not zip files as provided by this erratum.\n\nSecurity Fix(es):\n\n* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own. (CVE-2016-6816)\n\n* An EAP feature to download server log files allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user\u0027s browser to request the log files consuming enough resources that normal server functioning could be impaired. (CVE-2016-8627)\n\n* It was discovered that when configuring RBAC and marking information as sensitive, users with a Monitor role are able to view the sensitive information. (CVE-2016-7061)\n\nThe CVE-2016-8627 issue was discovered by Darran Lofthouse and Brian Stansberry (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0247", "url": "https://access.redhat.com/errata/RHSA-2017:0247" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/", "url": "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.4", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.4" }, { "category": "external", "summary": "1380852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380852" }, { "category": "external", "summary": "1388240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388240" }, { "category": "external", "summary": "1397484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397484" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0247.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update", "tracking": { "current_release_date": "2025-01-26T20:04:21+00:00", "generator": { "date": "2025-01-26T20:04:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.6" } }, "id": "RHSA-2017:0247", "initial_release_date": "2017-02-02T20:23:26+00:00", "revision_history": [ { "date": "2017-02-02T20:23:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-05-02T21:58:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-26T20:04:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.4", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.4", "product_id": "Red Hat JBoss Enterprise Application Platform 6.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6.4" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-6816", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2016-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1397484" } ], "notes": [ { "category": "description", "text": "It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests", "title": "Vulnerability summary" }, { "category": "other", "text": "Applying the fix provided to mitigate this issue may cause Tomcat to return 400 status after updating. For more information, refer to https://access.redhat.com/solutions/2891171", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6816" }, { "category": "external", "summary": "RHBZ#1397484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6816" }, { "category": "external", "summary": "https://access.redhat.com/articles/2991951", "url": "https://access.redhat.com/articles/2991951" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2891171", "url": "https://access.redhat.com/solutions/2891171" }, { "category": "external", "summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8" } ], "release_date": "2016-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-02T20:23:26+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests" }, { "cve": "CVE-2016-7061", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2016-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1380852" } ], "notes": [ { "category": "description", "text": "It was discovered that when configuring RBAC and marking information as sensitive, users with a Monitor role are able to view the sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "EAP: Sensitive data can be exposed at the server level in domain mode", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7061" }, { "category": "external", "summary": "RHBZ#1380852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380852" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7061", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7061" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7061", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7061" } ], "release_date": "2016-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-02T20:23:26+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "EAP: Sensitive data can be exposed at the server level in domain mode" }, { "acknowledgments": [ { "names": [ "Brian Stansberry", "Darran Lofthouse" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-8627", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2016-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388240" } ], "notes": [ { "category": "description", "text": "An EAP feature to download server log files allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user\u0027s browser to request the log files consuming enough resources that normal server functioning could be impaired.", "title": "Vulnerability description" }, { "category": "summary", "text": "admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8627" }, { "category": "external", "summary": "RHBZ#1388240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8627", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8627" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8627", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8627" } ], "release_date": "2017-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-02T20:23:26+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0247" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files" } ] }
fkie_cve-2016-6816
Vulnerability from fkie_nvd
Published
2017-03-20 18:59
Modified
2025-04-20 01:37
Severity ?
Summary
The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | http://rhn.redhat.com/errata/RHSA-2017-0244.html | ||
security@apache.org | http://rhn.redhat.com/errata/RHSA-2017-0245.html | ||
security@apache.org | http://rhn.redhat.com/errata/RHSA-2017-0246.html | ||
security@apache.org | http://rhn.redhat.com/errata/RHSA-2017-0247.html | ||
security@apache.org | http://rhn.redhat.com/errata/RHSA-2017-0250.html | ||
security@apache.org | http://rhn.redhat.com/errata/RHSA-2017-0457.html | ||
security@apache.org | http://rhn.redhat.com/errata/RHSA-2017-0527.html | ||
security@apache.org | http://www.debian.org/security/2016/dsa-3738 | ||
security@apache.org | http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html | ||
security@apache.org | http://www.securityfocus.com/bid/94461 | Third Party Advisory, VDB Entry | |
security@apache.org | http://www.securitytracker.com/id/1037332 | ||
security@apache.org | https://access.redhat.com/errata/RHSA-2017:0455 | ||
security@apache.org | https://access.redhat.com/errata/RHSA-2017:0456 | ||
security@apache.org | https://access.redhat.com/errata/RHSA-2017:0935 | ||
security@apache.org | https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E | ||
security@apache.org | https://security.netapp.com/advisory/ntap-20180607-0001/ | ||
security@apache.org | https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48 | Release Notes, Vendor Advisory | |
security@apache.org | https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73 | Release Notes, Vendor Advisory | |
security@apache.org | https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39 | Release Notes, Vendor Advisory | |
security@apache.org | https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8 | Release Notes, Vendor Advisory | |
security@apache.org | https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13 | Release Notes, Vendor Advisory | |
security@apache.org | https://usn.ubuntu.com/4557-1/ | ||
security@apache.org | https://www.exploit-db.com/exploits/41783/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2017-0244.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2017-0245.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2017-0246.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2017-0247.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2017-0250.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2017-0457.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2017-0527.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2016/dsa-3738 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/94461 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1037332 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:0455 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:0456 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:0935 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20180607-0001/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4557-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/41783/ |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | tomcat | 6.0.0 | |
apache | tomcat | 6.0.1 | |
apache | tomcat | 6.0.2 | |
apache | tomcat | 6.0.3 | |
apache | tomcat | 6.0.4 | |
apache | tomcat | 6.0.5 | |
apache | tomcat | 6.0.6 | |
apache | tomcat | 6.0.7 | |
apache | tomcat | 6.0.8 | |
apache | tomcat | 6.0.9 | |
apache | tomcat | 6.0.10 | |
apache | tomcat | 6.0.11 | |
apache | tomcat | 6.0.12 | |
apache | tomcat | 6.0.13 | |
apache | tomcat | 6.0.14 | |
apache | tomcat | 6.0.15 | |
apache | tomcat | 6.0.16 | |
apache | tomcat | 6.0.17 | |
apache | tomcat | 6.0.18 | |
apache | tomcat | 6.0.19 | |
apache | tomcat | 6.0.20 | |
apache | tomcat | 6.0.21 | |
apache | tomcat | 6.0.22 | |
apache | tomcat | 6.0.23 | |
apache | tomcat | 6.0.24 | |
apache | tomcat | 6.0.25 | |
apache | tomcat | 6.0.26 | |
apache | tomcat | 6.0.27 | |
apache | tomcat | 6.0.28 | |
apache | tomcat | 6.0.29 | |
apache | tomcat | 6.0.30 | |
apache | tomcat | 6.0.31 | |
apache | tomcat | 6.0.32 | |
apache | tomcat | 6.0.33 | |
apache | tomcat | 6.0.34 | |
apache | tomcat | 6.0.35 | |
apache | tomcat | 6.0.36 | |
apache | tomcat | 6.0.37 | |
apache | tomcat | 6.0.38 | |
apache | tomcat | 6.0.39 | |
apache | tomcat | 6.0.40 | |
apache | tomcat | 6.0.41 | |
apache | tomcat | 6.0.42 | |
apache | tomcat | 6.0.43 | |
apache | tomcat | 6.0.44 | |
apache | tomcat | 6.0.45 | |
apache | tomcat | 6.0.46 | |
apache | tomcat | 6.0.47 | |
apache | tomcat | 7.0.0 | |
apache | tomcat | 7.0.1 | |
apache | tomcat | 7.0.2 | |
apache | tomcat | 7.0.3 | |
apache | tomcat | 7.0.4 | |
apache | tomcat | 7.0.5 | |
apache | tomcat | 7.0.6 | |
apache | tomcat | 7.0.7 | |
apache | tomcat | 7.0.8 | |
apache | tomcat | 7.0.9 | |
apache | tomcat | 7.0.10 | |
apache | tomcat | 7.0.11 | |
apache | tomcat | 7.0.12 | |
apache | tomcat | 7.0.13 | |
apache | tomcat | 7.0.14 | |
apache | tomcat | 7.0.15 | |
apache | tomcat | 7.0.16 | |
apache | tomcat | 7.0.17 | |
apache | tomcat | 7.0.18 | |
apache | tomcat | 7.0.19 | |
apache | tomcat | 7.0.20 | |
apache | tomcat | 7.0.21 | |
apache | tomcat | 7.0.22 | |
apache | tomcat | 7.0.23 | |
apache | tomcat | 7.0.24 | |
apache | tomcat | 7.0.25 | |
apache | tomcat | 7.0.26 | |
apache | tomcat | 7.0.27 | |
apache | tomcat | 7.0.28 | |
apache | tomcat | 7.0.29 | |
apache | tomcat | 7.0.30 | |
apache | tomcat | 7.0.31 | |
apache | tomcat | 7.0.32 | |
apache | tomcat | 7.0.33 | |
apache | tomcat | 7.0.34 | |
apache | tomcat | 7.0.35 | |
apache | tomcat | 7.0.36 | |
apache | tomcat | 7.0.37 | |
apache | tomcat | 7.0.38 | |
apache | tomcat | 7.0.39 | |
apache | tomcat | 7.0.40 | |
apache | tomcat | 7.0.41 | |
apache | tomcat | 7.0.42 | |
apache | tomcat | 7.0.43 | |
apache | tomcat | 7.0.44 | |
apache | tomcat | 7.0.45 | |
apache | tomcat | 7.0.46 | |
apache | tomcat | 7.0.47 | |
apache | tomcat | 7.0.48 | |
apache | tomcat | 7.0.49 | |
apache | tomcat | 7.0.50 | |
apache | tomcat | 7.0.51 | |
apache | tomcat | 7.0.52 | |
apache | tomcat | 7.0.53 | |
apache | tomcat | 7.0.54 | |
apache | tomcat | 7.0.55 | |
apache | tomcat | 7.0.56 | |
apache | tomcat | 7.0.57 | |
apache | tomcat | 7.0.58 | |
apache | tomcat | 7.0.59 | |
apache | tomcat | 7.0.60 | |
apache | tomcat | 7.0.61 | |
apache | tomcat | 7.0.62 | |
apache | tomcat | 7.0.63 | |
apache | tomcat | 7.0.64 | |
apache | tomcat | 7.0.65 | |
apache | tomcat | 7.0.66 | |
apache | tomcat | 7.0.67 | |
apache | tomcat | 7.0.68 | |
apache | tomcat | 7.0.69 | |
apache | tomcat | 7.0.70 | |
apache | tomcat | 7.0.71 | |
apache | tomcat | 7.0.72 | |
apache | tomcat | 8.0.0 | |
apache | tomcat | 8.0.1 | |
apache | tomcat | 8.0.2 | |
apache | tomcat | 8.0.3 | |
apache | tomcat | 8.0.4 | |
apache | tomcat | 8.0.5 | |
apache | tomcat | 8.0.6 | |
apache | tomcat | 8.0.7 | |
apache | tomcat | 8.0.8 | |
apache | tomcat | 8.0.9 | |
apache | tomcat | 8.0.10 | |
apache | tomcat | 8.0.11 | |
apache | tomcat | 8.0.12 | |
apache | tomcat | 8.0.13 | |
apache | tomcat | 8.0.14 | |
apache | tomcat | 8.0.15 | |
apache | tomcat | 8.0.16 | |
apache | tomcat | 8.0.17 | |
apache | tomcat | 8.0.18 | |
apache | tomcat | 8.0.19 | |
apache | tomcat | 8.0.20 | |
apache | tomcat | 8.0.21 | |
apache | tomcat | 8.0.22 | |
apache | tomcat | 8.0.23 | |
apache | tomcat | 8.0.24 | |
apache | tomcat | 8.0.25 | |
apache | tomcat | 8.0.26 | |
apache | tomcat | 8.0.27 | |
apache | tomcat | 8.0.28 | |
apache | tomcat | 8.0.29 | |
apache | tomcat | 8.0.30 | |
apache | tomcat | 8.0.31 | |
apache | tomcat | 8.0.32 | |
apache | tomcat | 8.0.33 | |
apache | tomcat | 8.0.34 | |
apache | tomcat | 8.0.35 | |
apache | tomcat | 8.0.36 | |
apache | tomcat | 8.0.37 | |
apache | tomcat | 8.0.38 | |
apache | tomcat | 8.5.0 | |
apache | tomcat | 8.5.1 | |
apache | tomcat | 8.5.2 | |
apache | tomcat | 8.5.3 | |
apache | tomcat | 8.5.4 | |
apache | tomcat | 8.5.5 | |
apache | tomcat | 8.5.6 | |
apache | tomcat | 9.0.0 | |
apache | tomcat | 9.0.0 | |
apache | tomcat | 9.0.0 | |
apache | tomcat | 9.0.0 | |
apache | tomcat | 9.0.0 | |
apache | tomcat | 9.0.0 | |
apache | tomcat | 9.0.0 | |
apache | tomcat | 9.0.0 | |
apache | tomcat | 9.0.0 | |
apache | tomcat | 9.0.0 | |
apache | tomcat | 9.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "49E3C039-A949-4F1B-892A-57147EECB249", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F28C7801-41B9-4552-BA1E-577967BCBBEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "25B21085-7259-4685-9D1F-FF98E6489E10", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "635EE321-2A1F-4FF8-95BE-0C26591969D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A81B035-8598-4D2C-B45F-C6C9D4B10C2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E1096947-82A6-4EA8-A4F2-00D91E3F7DAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "0EBFA1D3-16A6-4041-BB30-51D2EE0F2AF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "B70B372F-EFFD-4AF7-99B5-7D1B23A0C54C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "9C95ADA4-66F5-45C4-A677-ACE22367A75A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "11951A10-39A2-4FF5-8C43-DF94730FB794", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "351E5BCF-A56B-4D91-BA3C-21A4B77D529A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "2DC2BBB4-171E-4EFF-A575-A5B7FF031755", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "6B6B0504-27C1-4824-A928-A878CBBAB32D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "CE81AD36-ACD1-4C6C-8E7C-5326D1DA3045", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "D903956B-14F5-4177-AF12-0A5F1846D3C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "81F847DC-A2F5-456C-9038-16A0E85F4C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "AF3EBD00-1E1E-452D-AFFB-08A6BD111DDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "C6B93A3A-D487-4CA1-8257-26F8FE287B8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "BD8802B2-57E0-4AA6-BC8E-00DE60468569", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "8461DF95-18DC-4BF5-A703-7F19DA88DC30", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "1F4C9BCF-9C73-4991-B02F-E08C5DA06EBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "0682A754-5E5E-48D4-836A-16841FD59445", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "3A8F2DFC-6A74-43AB-A813-957A1F7097A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "277332E0-60D9-4318-A068-901F3B037FA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "2823789C-2CB6-4300-94DB-BDBE83ABA8E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "759588B8-DD36-474E-978B-75638962E743", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "C5416C76-46ED-4CB1-A7F8-F24EA16DE7F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "A61429EE-4331-430C-9830-58DCCBCBCB58", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:*", "matchCriteriaId": "31B3593F-CEDF-423C-90F8-F88EED87DC3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "AE7862B2-E1FA-4E16-92CD-8918AB461D9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "A9E03BE3-60CC-4415-B993-D0BB00F87A30", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "CE92E59A-FF0D-4D1A-8B12-CC41A7E1FD3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "BFD64FE7-ABAF-49F3-B8D0-91C37C822F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "48E5E8C3-21AD-4230-B945-AB7DE66307B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.34:*:*:*:*:*:*:*", "matchCriteriaId": "2949EC36-0056-43F0-93EC-681EAC22B112", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "4945C8C1-C71B-448B-9075-07C6C92599CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "ED4730B0-2E09-408B-AFD4-FE00F73700FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.37:*:*:*:*:*:*:*", "matchCriteriaId": "B8DE8A8A-7643-4292-BCC1-758AE0940207", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "3CB6826E-FEBF-4DD7-BED5-1942DFA73BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.39:*:*:*:*:*:*:*", "matchCriteriaId": "E9B54FCD-CF7C-47E2-8513-40419E47AF49", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.40:*:*:*:*:*:*:*", "matchCriteriaId": "8B9AC2B8-D1AC-48E2-B88E-C7837D4F8A7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "D87EFB6D-B626-469F-907C-40C771A55833", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "38DA4B34-1759-4FC5-82E9-B2223905B9B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.43:*:*:*:*:*:*:*", "matchCriteriaId": "6330B97B-8FC5-4D7E-A960-5D94EDD0C378", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "2A0B2FA4-772E-4B23-8B3F-CC86515E4226", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "0AE27868-CBD2-4EB9-8732-DD4C0E10D6D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.46:*:*:*:*:*:*:*", "matchCriteriaId": "7B1F7611-C424-4B5E-94B3-3B69EABF342E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.47:*:*:*:*:*:*:*", "matchCriteriaId": "4C132EED-8FCA-4FDA-9FF6-C5FA44E8DA2E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0F8C62EF-1B67-456A-9C66-755439CF8556", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A819E245-D641-4F19-9139-6C940504F6E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "8C381275-10C5-4939-BCE3-0D1F3B3CB2EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7205475A-6D04-4042-B24E-1DA5A57029B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "08022987-B36B-4F63-88A5-A8F59195DF4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "FF4B7557-EF35-451E-B55D-3296966695AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "8980E61E-27BE-4858-82B3-C0E8128AF521", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "8756BF9B-3E24-4677-87AE-31CE776541F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "88CE057E-2092-4C98-8D0C-75CF439D0A9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8F194580-EE6D-4E38-87F3-F0661262256B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "A9731BAA-4C6C-4259-B786-F577D8A90FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "1F74A421-D019-4248-84B8-C70D4D9A8A95", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "2BA27FF9-4C66-4E17-95C0-1CB2DAA6AFC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "05346F5A-FB52-4376-AAC7-9A5308216545", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "305688F2-50A6-41FB-8614-BC589DB9A789", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D24AA431-C436-4AA5-85DF-B9AAFF2548FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "25966344-15D5-4101-9346-B06BFD2DFFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "11F4CBAC-27B1-4EFF-955A-A63B457D0578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "FD55B338-9DBE-4643-ABED-A08964D3AF7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "0D4F710E-06EA-48F4-AC6A-6F143950F015", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "2C4936C2-0B2D-4C44-98C3-443090965F5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "48453405-2319-4327-9F4C-6F70B49452C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "49DD9544-6424-41A6-AEC0-EC19B8A10E71", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "E4670E65-2E11-49A4-B661-57C2F60D411F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "5E8FF71D-4710-4FBB-9925-A6A26C450F7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "31002A23-4788-4BC7-AE11-A3C2AA31716D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "7144EDDF-8265-4642-8EEB-ED52527E0A26", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "DF06B5C1-B9DD-4673-A101-56E1E593ACDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*", "matchCriteriaId": "7D731065-626B-4425-8E49-F708DD457824", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "B3D850EA-E537-42C8-93B9-96E15CB26747", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E037DA05-2BEF-4F64-B8BB-307247B6A05C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "BCAF1EB5-FB34-40FC-96ED-9D073890D8BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "D395D95B-1F4A-420E-A0F6-609360AF7B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "9BD221BA-0AB6-4972-8AD9-5D37AC07762F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*", "matchCriteriaId": "E55B6565-96CB-4F6A-9A80-C3FB82F30546", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "D3300AFE-49A4-4904-B9A0-5679F09FA01E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "ED5125CC-05F9-4678-90DB-A5C7CD24AE6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*", "matchCriteriaId": "7BD93669-1B30-4BF8-AD7D-F60DD8D63CC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "1B904C74-B92E-4EAE-AE6C-78E2B844C3DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*", "matchCriteriaId": "B8C8C97F-6C9D-4647-AB8A-ADAA5536DDE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:*", "matchCriteriaId": "2C6109D1-BC36-40C5-A02A-7AEBC949BAC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "DA8A7333-B4C3-4876-AE01-62F2FD315504", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "92993E23-D805-407B-8B87-11CEEE8B212F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.43:*:*:*:*:*:*:*", "matchCriteriaId": "7A11BD74-305C-41E2-95B1-5008EEF5FA5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "595442D0-9DB7-475A-AE30-8535B70E122E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "4B0BA92A-0BD3-4CE4-9465-95E949104BAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.46:*:*:*:*:*:*:*", "matchCriteriaId": "6F944B72-B9EB-4EB8-AEA3-E0D7ADBE1305", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.47:*:*:*:*:*:*:*", "matchCriteriaId": "6AA28D3A-3EE5-4F90-B8F5-4943F7607DA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.48:*:*:*:*:*:*:*", "matchCriteriaId": "BFD3EB84-2ED2-49D4-8BC9-6398C2E46F0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.49:*:*:*:*:*:*:*", "matchCriteriaId": "DEDF6E1A-0DD6-42AB-9510-F6F4B6002C91", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "C947E549-2459-4AFB-84A7-36BDA30B5F29", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "67A0EA46-5AEA-4D0A-B89E-6560FA10EC08", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.52:*:*:*:*:*:*:*", "matchCriteriaId": "5D55DF79-F9BE-4907-A4D8-96C4B11189ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.53:*:*:*:*:*:*:*", "matchCriteriaId": "14AB5787-82D7-4F78-BE93-4556AB7A7D0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.54:*:*:*:*:*:*:*", "matchCriteriaId": "F8E9453E-BC9B-4F77-85FA-BA15AC55C245", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.55:*:*:*:*:*:*:*", "matchCriteriaId": "A7EF0518-73F9-47DB-8946-A8334936BEFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.56:*:*:*:*:*:*:*", "matchCriteriaId": "95AA8778-7833-4572-A71B-5FD89938CE94", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.57:*:*:*:*:*:*:*", "matchCriteriaId": "242E47CE-EF69-4F8F-AB40-5AF2811674CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.58:*:*:*:*:*:*:*", "matchCriteriaId": "A225D4F7-174E-47C3-8390-C6FA28DB5A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.59:*:*:*:*:*:*:*", "matchCriteriaId": "CDA1555C-E55A-4E14-B786-BFEE3F09220B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "6BAC42AE-B82A-4ABF-9519-B2D97D925707", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.61:*:*:*:*:*:*:*", "matchCriteriaId": "F8075E9A-DA7F-4A0B-8B4D-0CD951369111", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.62:*:*:*:*:*:*:*", "matchCriteriaId": "335A5320-6086-4B45-9903-82F6F92A584F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.63:*:*:*:*:*:*:*", "matchCriteriaId": "46B33408-C2E2-4E7C-9334-6AB98F13468C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.64:*:*:*:*:*:*:*", "matchCriteriaId": "9F036676-9EFB-4A92-828E-A38905D594E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.65:*:*:*:*:*:*:*", "matchCriteriaId": "E9728EE8-6029-4DF3-942E-E4ACC09111A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.66:*:*:*:*:*:*:*", "matchCriteriaId": "62DBB843-288C-4060-8777-6CDCF1860D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.67:*:*:*:*:*:*:*", "matchCriteriaId": "34E7DAC8-8419-45D1-A28F-14CF2FE1B6EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.68:*:*:*:*:*:*:*", "matchCriteriaId": "89B87EB5-4902-4C2A-878A-45185F7D0FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.69:*:*:*:*:*:*:*", "matchCriteriaId": "C0596E6C-9ACE-4106-A2FF-BED7967C323F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.70:*:*:*:*:*:*:*", "matchCriteriaId": "8F7158DC-966B-4508-8600-40E3E9D3D0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.71:*:*:*:*:*:*:*", "matchCriteriaId": "A190FE0D-86C1-49EE-BDAE-5879C32BDC92", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.72:*:*:*:*:*:*:*", "matchCriteriaId": "CA20F45F-01A2-43DD-9731-DFF54E31719F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:tomcat:8.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "67E42327-8AEA-4B92-BA5F-AF94430B3BBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "2A358FDF-C249-4D7A-9445-8B9E7D9D40AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "8C4DB619-F6B0-4896-9AE2-7E7D92105577", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AFF96F96-34DB-4EB3-BF59-11220673FA26", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "44883383-6360-4BE6-9B48-1308F85E5797", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "EDF3E379-47D2-4C86-8C6D-8B3C25A0E1C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "E82391BD-10FF-4E7F-91DC-35AA11325530", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "92C22F12-C072-4A12-A4A9-CBF589A36FF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "61E008F8-2F01-4DD8-853A-337B4B4163C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6A776B25-6AF1-421B-8E47-2A7499F6B4D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "7A332FDE-42AE-4F48-9553-5AE953CD6D3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "701424A2-BB06-44B5-B468-7164E4F95529", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "1BA6388C-5B6E-4651-8AE3-EBCCF61C27E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "A63FA521-9D20-49B9-A9A4-0DF891B4E4E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "8F9A5B7E-33A9-4651-9BE1-371A0064B661", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "F99252E8-A59C-48E1-B251-718D7FB3E399", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "9D05293B-B9D8-42F1-9367-9D2E058EFAD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "4E0DDEF6-A8EE-46C4-A046-A1F26E7C4E87", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "14B38892-9C00-4510-B7BA-F2A8F2CACCAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "8C913AA6-2260-4249-BE1D-7139F45735D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "7409B064-D43E-489E-AEC6-0A767FB21737", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "F019268F-80C4-48FE-8164-E9DA0A3BAFF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "1EFBD214-FCFE-4F04-A903-66EFDA764B9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "425D86B3-6BB9-410D-8125-F7CF87290AD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "3EE3BB0D-1002-41E4-9BE8-875D97330057", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "25D0E80B-EDDA-4876-912D-44BFE6211EB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "6622472B-8644-4D45-A54B-A215C3D64B83", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "B338F95B-2924-435B-827F-E64420A93244", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.28:*:*:*:*:*:*:*", "matchCriteriaId": "209D1349-7740-4DBE-80A5-E6343C62BAB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "09E77C24-C265-403D-A193-B3739713F6B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "28616FA3-9A98-4AAE-9F94-3E77A14156EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "335925DA-11C0-4222-B6B7-82602B361751", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "603A14BF-72BB-4A3D-8CBC-932DC45CEC06", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "4C2E1C55-3C89-4F26-A981-1195BCC9BB5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.34:*:*:*:*:*:*:*", "matchCriteriaId": "FC242407-A447-4ABD-8E19-EB6DB1F35121", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "31BB906B-812F-462C-9AEE-147C1418D865", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "0B701E17-D231-44ED-A46E-C67749A725B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.37:*:*:*:*:*:*:*", "matchCriteriaId": "B8CAF2F7-D227-4F06-B0E6-533C5EDB105B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "305B73CE-0224-4E73-8EB2-FC41A62FBA08", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:tomcat:8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "69A7FC28-A0EC-4516-9776-700343D2F4DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "18814653-6D44-47D9-A2F5-89C5AFB255F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D4D811A9-4988-4C11-AA27-F5BE2B93D8D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "FAEF824D-7E95-4BC1-8DBB-787DCE595E21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "97F4A2B3-DB1D-4D0B-B5FF-7EE2A0D291BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "0B461D5A-1208-498F-B551-46C6D514AC2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:8.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "598E5D91-0165-4D55-9EDD-EBB5AAAD1172", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*", "matchCriteriaId": "9D0689FE-4BC0-4F53-8C79-34B21F9B86C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*", "matchCriteriaId": "89B129B2-FB6F-4EF9-BF12-E589A87996CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*", "matchCriteriaId": "8B6787B6-54A8-475E-BA1C-AB99334B2535", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:*", "matchCriteriaId": "9F542E12-6BA8-4504-A494-DA83E7E19BD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:*", "matchCriteriaId": "C0C5F004-F7D8-45DB-B173-351C50B0EC16", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:*", "matchCriteriaId": "D1902D2E-1896-4D3D-9E1C-3A675255072C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*", "matchCriteriaId": "49AAF4DF-F61D-47A8-8788-A21E317A145D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*", "matchCriteriaId": "454211D0-60A2-4661-AECA-4C0121413FEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*", "matchCriteriaId": "0686F977-889F-4960-8E0B-7784B73A7F2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*", "matchCriteriaId": "558703AE-DB5E-4DFF-B497-C36694DD7B24", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*", "matchCriteriaId": "ED6273F2-1165-47A4-8DD7-9E9B2472941B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own." }, { "lang": "es", "value": "El c\u00f3digo en Apache Tomcat 9.0.0.M1 a 9.0.0.M11, 8.5.0 a 8.5.6, 8.0.0.RC1 a 8.0.38, 7.0.0 a 7.0.72 y 6.0.0 a 6.0.47 que analiz\u00f3 la l\u00ednea de solicitud HTTP permiti\u00f3 caracteres no v\u00e1lidos. Esto podr\u00eda ser explotado, junto con un proxy que tambi\u00e9n permiti\u00f3 los caracteres no v\u00e1lidos, pero con una interpretaci\u00f3n diferente, para inyectar datos en la respuesta HTTP. Mediante la manipulaci\u00f3n de la respuesta HTTP, el atacante podr\u00eda envenenar una cach\u00e9 web, realizar un ataque XSS y/u obtener informaci\u00f3n sensible de otras solicitudes que no sean las suyas." } ], "id": "CVE-2016-6816", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-20T18:59:00.173", "references": [ { "source": "security@apache.org", "url": "http://rhn.redhat.com/errata/RHSA-2017-0244.html" }, { "source": "security@apache.org", "url": "http://rhn.redhat.com/errata/RHSA-2017-0245.html" }, { "source": "security@apache.org", "url": "http://rhn.redhat.com/errata/RHSA-2017-0246.html" }, { "source": "security@apache.org", "url": "http://rhn.redhat.com/errata/RHSA-2017-0247.html" }, { "source": "security@apache.org", "url": "http://rhn.redhat.com/errata/RHSA-2017-0250.html" }, { "source": "security@apache.org", "url": "http://rhn.redhat.com/errata/RHSA-2017-0457.html" }, { "source": "security@apache.org", "url": "http://rhn.redhat.com/errata/RHSA-2017-0527.html" }, { "source": "security@apache.org", "url": "http://www.debian.org/security/2016/dsa-3738" }, { "source": "security@apache.org", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94461" }, { "source": "security@apache.org", "url": "http://www.securitytracker.com/id/1037332" }, { "source": "security@apache.org", "url": "https://access.redhat.com/errata/RHSA-2017:0455" }, { "source": "security@apache.org", "url": "https://access.redhat.com/errata/RHSA-2017:0456" }, { "source": "security@apache.org", "url": "https://access.redhat.com/errata/RHSA-2017:0935" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E" }, { "source": "security@apache.org", "url": "https://security.netapp.com/advisory/ntap-20180607-0001/" }, { "source": "security@apache.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48" }, { "source": "security@apache.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73" }, { "source": "security@apache.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39" }, { "source": "security@apache.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8" }, { "source": "security@apache.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13" }, { "source": "security@apache.org", "url": "https://usn.ubuntu.com/4557-1/" }, { "source": "security@apache.org", "url": "https://www.exploit-db.com/exploits/41783/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2017-0244.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2017-0245.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2017-0246.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2017-0247.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2017-0250.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2017-0457.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2017-0527.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2016/dsa-3738" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1037332" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2017:0455" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2017:0456" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2017:0935" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20180607-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/4557-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/41783/" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
wid-sec-w-2024-0528
Vulnerability from csaf_certbund
Published
2024-02-29 23:00
Modified
2024-02-29 23:00
Summary
Dell Data Protection Advisor: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Data Protection Advisor ist eine Monitoring Lösung. Der Collector ist der lokale Agent.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Dell Data Protection Advisor ausnutzen, um beliebigen Code auszuführen, einen Denial-of-Service-Zustand herbeizuführen, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Berechtigungen zu erweitern oder einen nicht spezifizierten Angriff durchzuführen.
Betroffene Betriebssysteme
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Data Protection Advisor ist eine Monitoring L\u00f6sung. Der Collector ist der lokale Agent.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell Data Protection Advisor ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Berechtigungen zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0528 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0528.json" }, { "category": "self", "summary": "WID-SEC-2024-0528 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0528" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-107 vom 2024-02-29", "url": "https://www.dell.com/support/kbdoc/000222618/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell Data Protection Advisor: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-02-29T23:00:00.000+00:00", "generator": { "date": "2024-08-15T18:05:58.480+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-0528", "initial_release_date": "2024-02-29T23:00:00.000+00:00", "revision_history": [ { "date": "2024-02-29T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 19.10", "product": { "name": "Dell Data Protection Advisor \u003c 19.10", "product_id": "T033198" } } ], "category": "product_name", "name": "Data Protection Advisor" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-45648", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2023-45648" }, { "cve": "CVE-2023-42795", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2023-42795" }, { "cve": "CVE-2023-41080", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2023-41080" }, { "cve": "CVE-2023-34055", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2023-34055" }, { "cve": "CVE-2023-28708", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2023-28708" }, { "cve": "CVE-2023-28154", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2023-28154" }, { "cve": "CVE-2023-22081", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2023-22081" }, { "cve": "CVE-2023-22067", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2023-22067" }, { "cve": "CVE-2023-22025", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2023-22025" }, { "cve": "CVE-2023-20883", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2023-20883" }, { "cve": "CVE-2023-20873", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2023-20873" }, { "cve": "CVE-2023-20863", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2023-20863" }, { "cve": "CVE-2023-20861", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2023-20861" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2022-46175" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-27772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2022-27772" }, { "cve": "CVE-2022-25881", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2022-25881" }, { "cve": "CVE-2022-25858", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2022-25858" }, { "cve": "CVE-2022-22971", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2022-22971" }, { "cve": "CVE-2022-22970", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2022-22970" }, { "cve": "CVE-2022-22968", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2022-22968" }, { "cve": "CVE-2022-22965", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2022-22965" }, { "cve": "CVE-2022-22950", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2022-22950" }, { "cve": "CVE-2021-43980", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2021-43980" }, { "cve": "CVE-2021-33037", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2021-33037" }, { "cve": "CVE-2021-30640", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2021-30640" }, { "cve": "CVE-2020-5421", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2020-5421" }, { "cve": "CVE-2020-1938", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2020-1938" }, { "cve": "CVE-2020-1935", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2020-1935" }, { "cve": "CVE-2020-13943", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2020-13943" }, { "cve": "CVE-2020-13935", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2020-13935" }, { "cve": "CVE-2020-13934", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2020-13934" }, { "cve": "CVE-2020-11996", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2020-11996" }, { "cve": "CVE-2019-2684", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2019-2684" }, { "cve": "CVE-2019-17563", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2019-17563" }, { "cve": "CVE-2019-12418", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2019-12418" }, { "cve": "CVE-2019-10072", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2019-10072" }, { "cve": "CVE-2019-0232", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2019-0232" }, { "cve": "CVE-2019-0221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2019-0221" }, { "cve": "CVE-2019-0199", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2019-0199" }, { "cve": "CVE-2018-8037", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2018-8037" }, { "cve": "CVE-2018-8034", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2018-8034" }, { "cve": "CVE-2018-8014", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2018-8014" }, { "cve": "CVE-2018-15756", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2018-15756" }, { "cve": "CVE-2018-1336", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2018-1336" }, { "cve": "CVE-2018-1305", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2018-1305" }, { "cve": "CVE-2018-1304", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2018-1304" }, { "cve": "CVE-2018-1275", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2018-1275" }, { "cve": "CVE-2018-1272", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2018-1272" }, { "cve": "CVE-2018-1271", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2018-1271" }, { "cve": "CVE-2018-1270", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2018-1270" }, { "cve": "CVE-2018-1257", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2018-1257" }, { "cve": "CVE-2018-1199", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2018-1199" }, { "cve": "CVE-2018-1196", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2018-1196" }, { "cve": "CVE-2018-11784", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2018-11784" }, { "cve": "CVE-2018-11040", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2018-11040" }, { "cve": "CVE-2018-11039", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2018-11039" }, { "cve": "CVE-2017-8046", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2017-8046" }, { "cve": "CVE-2017-7675", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2017-7675" }, { "cve": "CVE-2017-7674", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2017-7674" }, { "cve": "CVE-2017-5664", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2017-5664" }, { "cve": "CVE-2017-5651", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2017-5651" }, { "cve": "CVE-2017-5650", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2017-5650" }, { "cve": "CVE-2017-5648", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2017-5648" }, { "cve": "CVE-2017-5647", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2017-5647" }, { "cve": "CVE-2017-18640", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2017-18640" }, { "cve": "CVE-2017-12617", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2017-12617" }, { "cve": "CVE-2016-9878", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2016-9878" }, { "cve": "CVE-2016-8745", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2016-8745" }, { "cve": "CVE-2016-8735", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2016-8735" }, { "cve": "CVE-2016-6817", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2016-6817" }, { "cve": "CVE-2016-6816", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00.000+00:00", "title": "CVE-2016-6816" } ] }
wid-sec-w-2025-0215
Vulnerability from csaf_certbund
Published
2016-11-22 23:00
Modified
2025-01-29 23:00
Summary
Apache Tomcat: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Apache Tomcat ist ein Web-Applikationsserver für verschiedene Plattformen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apache Tomcat ausnutzen, um einen Denial of Service Angriff durchzuführen, vertrauliche Informationen offenzulegen oder beliebigen Code zur Ausführung zu bringen.
Betroffene Betriebssysteme
- F5 Networks
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apache Tomcat ist ein Web-Applikationsserver f\u00fcr verschiedene Plattformen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apache Tomcat ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen oder beliebigen Code zur Ausf\u00fchrung zu bringen.", "title": "Angriff" }, { "category": "general", "text": "- F5 Networks\n- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0215 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2016/wid-sec-w-2025-0215.json" }, { "category": "self", "summary": "WID-SEC-2025-0215 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0215" }, { "category": "external", "summary": "Openwall OSS-Security vom 2016-11-22", "url": "http://seclists.org/oss-sec/2016/q4/501" }, { "category": "external", "summary": "Openwall OSS-Security vom 2016-11-22", "url": "http://seclists.org/oss-sec/2016/q4/502" }, { "category": "external", "summary": "Openwall OSS-Security vom 2016-11-22", "url": "http://seclists.org/oss-sec/2016/q4/503" }, { "category": "external", "summary": "Apache Tomcat 9.0.0.M13 vom 2016-11-22", "url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13" }, { "category": "external", "summary": "Apache Tomcat 8.0.39 vom 2016-11-22", "url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39" }, { "category": "external", "summary": "Apache Tomcat 7.0.73 vom 2016-11-22", "url": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73" }, { "category": "external", "summary": "Apache Tomcat 6.0.48 vom 2016-11-22", "url": "http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48" }, { "category": "external", "summary": "F5 Security Advisory SOL50116122 vom 2016-12-02", "url": "https://support.f5.com/kb/en-us/solutions/public/k/50/sol50116122.html" }, { "category": "external", "summary": "F5 Security Advisory SOL49820145 vom 2016-12-02", "url": "https://support.f5.com/kb/en-us/solutions/public/k/49/sol49820145.html" }, { "category": "external", "summary": "F5 Security Advisory SOL49160100 vom 2016-12-02", "url": "https://support.f5.com/kb/en-us/solutions/public/k/49/sol49160100.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:3079-1 vom 2016-12-11", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163079-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:3081-1 vom 2016-12-11", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163081-1.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-3739 vom 2016-12-18", "url": "https://www.debian.org/security/2016/dsa-3739" }, { "category": "external", "summary": "Debian Security Advisory DSA-3738 vom 2016-12-18", "url": "https://www.debian.org/security/2016/dsa-3738" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3177-1 vom 2017-01-23", "url": "http://www.ubuntu.com/usn/usn-3177-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3177-2 vom 2017-02-02", "url": "http://www.ubuntu.com/usn/usn-3177-2/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2017:0250 vom 2017-02-03", "url": "https://access.redhat.com/errata/RHSA-2017:0250" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2017:0245 vom 2017-02-03", "url": "https://access.redhat.com/errata/RHSA-2017:0245" }, { "category": "external", "summary": "F5 Security Advisory K50116122 vom 2017-02-27", "url": "https://support.f5.com/csp/article/K50116122" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2017:0527 vom 2017-03-15", "url": "https://access.redhat.com/errata/RHSA-2017:0527" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2017-0527 vom 2017-03-15", "url": "http://linux.oracle.com/errata/ELSA-2017-0527.html" }, { "category": "external", "summary": "Exploit-DB #41783 vom 2017-04-03", "url": "https://www.exploit-db.com/exploits/41783/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2017:0935 vom 2017-04-12", "url": "https://access.redhat.com/errata/RHSA-2017:0935" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2017-0935 vom 2017-04-13", "url": "http://linux.oracle.com/errata/ELSA-2017-0935.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2017:1632-1 vom 2017-06-21", "url": "https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00025.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2017:1660-1 vom 2017-06-24", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171660-1.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4557-1 vom 2020-09-30", "url": "https://usn.ubuntu.com/4557-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7242-1 vom 2025-01-30", "url": "https://ubuntu.com/security/notices/USN-7242-1" } ], "source_lang": "en-US", "title": "Apache Tomcat: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-01-29T23:00:00.000+00:00", "generator": { "date": "2025-01-30T10:27:36.880+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2025-0215", "initial_release_date": "2016-11-22T23:00:00.000+00:00", "revision_history": [ { "date": "2016-11-22T23:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2016-11-22T23:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2016-12-01T23:00:00.000+00:00", "number": "3", "summary": "New remediations available" }, { "date": "2016-12-01T23:00:00.000+00:00", "number": "4", "summary": "Version nicht vorhanden" }, { "date": "2016-12-01T23:00:00.000+00:00", "number": "5", "summary": "Version nicht vorhanden" }, { "date": "2016-12-04T23:00:00.000+00:00", "number": "6", "summary": "New remediations available" }, { "date": "2016-12-11T23:00:00.000+00:00", "number": "7", "summary": "New remediations available" }, { "date": "2016-12-11T23:00:00.000+00:00", "number": "8", "summary": "Version nicht vorhanden" }, { "date": "2016-12-18T23:00:00.000+00:00", "number": "9", "summary": "New remediations available" }, { "date": "2017-01-23T23:00:00.000+00:00", "number": "10", "summary": "New remediations available" }, { "date": "2017-02-02T23:00:00.000+00:00", "number": "11", "summary": "New remediations available" }, { "date": "2017-02-28T23:00:00.000+00:00", "number": "12", "summary": "New remediations available" }, { "date": "2017-03-15T23:00:00.000+00:00", "number": "13", "summary": "New remediations available" }, { "date": "2017-03-20T23:00:00.000+00:00", "number": "14", "summary": "Added references" }, { "date": "2017-04-12T22:00:00.000+00:00", "number": "15", "summary": "New remediations available" }, { "date": "2017-04-17T22:00:00.000+00:00", "number": "16", "summary": "Added references" }, { "date": "2017-06-20T22:00:00.000+00:00", "number": "17", "summary": "New remediations available" }, { "date": "2017-06-20T22:00:00.000+00:00", "number": "18", "summary": "Version nicht vorhanden" }, { "date": "2017-06-20T22:00:00.000+00:00", "number": "19", "summary": "Version nicht vorhanden" }, { "date": "2017-06-26T22:00:00.000+00:00", "number": "20", "summary": "New remediations available" }, { "date": "2020-09-30T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-29T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "22" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c6.0.48", "product": { "name": "Apache Tomcat \u003c6.0.48", "product_id": "T008972" } }, { "category": "product_version", "name": "6.0.48", "product": { "name": "Apache Tomcat 6.0.48", "product_id": "T008972-fixed", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:6.0.48" } } }, { "category": "product_version_range", "name": "\u003c7.0.73", "product": { "name": "Apache Tomcat \u003c7.0.73", "product_id": "T008973" } }, { "category": "product_version", "name": "7.0.73", "product": { "name": "Apache Tomcat 7.0.73", "product_id": "T008973-fixed", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:7.0.73" } } }, { "category": "product_version_range", "name": "\u003c8.0.39", "product": { "name": "Apache Tomcat \u003c8.0.39", "product_id": "T008974" } }, { "category": "product_version", "name": "8.0.39", "product": { "name": "Apache Tomcat 8.0.39", "product_id": "T008974-fixed", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:8.0.39" } } }, { "category": "product_version_range", "name": "\u003c9.0.0.M13", "product": { "name": "Apache Tomcat \u003c9.0.0.M13", "product_id": "T008975" } }, { "category": "product_version", "name": "9.0.0.M13", "product": { "name": "Apache Tomcat 9.0.0.M13", "product_id": "T008975-fixed", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:9.0.0.m13" } } } ], "category": "product_name", "name": "Tomcat" } ], "category": "vendor", "name": "Apache" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "F5 ARX", "product": { "name": "F5 ARX", "product_id": "T001664", "product_identification_helper": { "cpe": "cpe:/a:f5:arx:-" } } }, { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-6817", "notes": [ { "category": "description", "text": "Es existiert eine Denial of Service Schwachstelle in Apache Tomcat im Zusammenhang mit dem HTTP/2 Header Parser. Diese Schwachstelle beruht auf einer fehlerhaften Verarbeitung von HTTP/2 Headern, wenn ein empfangener Header gr\u00f6\u00dfer als der verf\u00fcgbare Puffer ist. Ein entfernter anonymer Angreifer kann diese Schwachstelle durch \u00dcbermitteln eines speziell gestalteten HTTP Pakets ausnutzen, um einen Denial of Service Zustand des HTTP/2 Header Parser herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T008974", "T008975", "2951", "67646", "T000126", "T004914" ] }, "release_date": "2016-11-22T23:00:00.000+00:00", "title": "CVE-2016-6817" }, { "cve": "CVE-2016-6816", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Apache Tomcat. Diese Schwachstelle beruht darauf, dass der Code, der f\u00fcr die Verarbeitung der HTTP Request Line verantwortlich ist, ung\u00fcltige Zeichen erlaubt. Dadurch ist ein entfernter anonymer Angreifer in der Lage in Verbindung mit einem Proxy, welcher ebenfalls ung\u00fcltige Zeichen erlaubt, diese Schwachstelle ausnutzen, sodass er Daten in HTTP Antworten injizieren kann. In der Folge kann der Angreifer Web Cache-Poisoning Angriffe durchf\u00fchren, um vertrauliche Informationen von Requests anderer Benutzer zu ermitteln bzw. Cross-Site Scripting Angriffe zu starten." } ], "product_status": { "known_affected": [ "T008974", "T008975", "T008972", "T008973", "2951", "T002207", "67646", "T000126", "T001664", "T001663", "T004914" ] }, "release_date": "2016-11-22T23:00:00.000+00:00", "title": "CVE-2016-6816" }, { "cve": "CVE-2016-8735", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Apache Tomcat in Verbindung mit dem JmxRemoteLifecycleListener, welche im Rahmen des Oracle Patches bez\u00fcglich der Schwachstelle CVE-2016-3427 nicht behoben wurde. Daher sind Apache Tomcat Installationen, die diesen Listener verwenden, weiterhin von der Schwachstelle betroffen. In der Folge k\u00f6nnen entfernte anonyme Angreifer diese Schwachstelle ausnutzen, um beliebigen Code zur Ausf\u00fchrung zu bringen." } ], "product_status": { "known_affected": [ "T008974", "T008975", "T008972", "T008973", "2951", "67646", "T000126", "T004914" ] }, "release_date": "2016-11-22T23:00:00.000+00:00", "title": "CVE-2016-8735" } ] }
gsd-2016-6816
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2016-6816", "description": "The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.", "id": "GSD-2016-6816", "references": [ "https://www.suse.com/security/cve/CVE-2016-6816.html", "https://www.debian.org/security/2016/dsa-3739", "https://www.debian.org/security/2016/dsa-3738", "https://access.redhat.com/errata/RHSA-2017:0935", "https://access.redhat.com/errata/RHSA-2017:0527", "https://access.redhat.com/errata/RHSA-2017:0457", "https://access.redhat.com/errata/RHSA-2017:0456", "https://access.redhat.com/errata/RHSA-2017:0455", "https://access.redhat.com/errata/RHSA-2017:0250", "https://access.redhat.com/errata/RHSA-2017:0247", "https://access.redhat.com/errata/RHSA-2017:0246", "https://access.redhat.com/errata/RHSA-2017:0245", "https://access.redhat.com/errata/RHSA-2017:0244", "https://ubuntu.com/security/CVE-2016-6816", "https://advisories.mageia.org/CVE-2016-6816.html", "https://alas.aws.amazon.com/cve/html/CVE-2016-6816.html", "https://linux.oracle.com/cve/CVE-2016-6816.html", "https://packetstormsecurity.com/files/cve/CVE-2016-6816" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-6816" ], "details": "The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.", "id": "GSD-2016-6816", "modified": "2023-12-13T01:21:22.932873Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2016-6816", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Tomcat", "version": { "version_data": [ { "version_value": "9.0.0.M1 to 9.0.0.M11" }, { "version_value": "8.5.0 to 8.5.6" }, { "version_value": "8.0.0.RC1 to 8.0.38" }, { "version_value": "7.0.0 to 7.0.72" }, { "version_value": "6.0.0 to 6.0.47" }, { "version_value": "Earlier, unsupported versions may also be affected." } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "character validation bypass" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2017:0250", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0250.html" }, { "name": "41783", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41783/" }, { "name": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39", "refsource": "CONFIRM", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39" }, { "name": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13", "refsource": "CONFIRM", "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13" }, { "name": "94461", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94461" }, { "name": "DSA-3738", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3738" }, { "name": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73", "refsource": "CONFIRM", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73" }, { "name": "RHSA-2017:0244", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0244.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "RHSA-2017:0935", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:0935" }, { "name": "https://security.netapp.com/advisory/ntap-20180607-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180607-0001/" }, { "name": "RHSA-2017:0457", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0457.html" }, { "name": "RHSA-2017:0246", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0246.html" }, { "name": "1037332", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037332" }, { "name": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8", "refsource": "CONFIRM", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8" }, { "name": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48", "refsource": "CONFIRM", "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48" }, { "name": "RHSA-2017:0455", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:0455" }, { "name": "RHSA-2017:0527", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0527.html" }, { "name": "RHSA-2017:0245", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0245.html" }, { "name": "RHSA-2017:0456", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:0456" }, { "name": "RHSA-2017:0247", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0247.html" }, { "name": "[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E" }, { "name": "USN-4557-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4557-1/" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "[6.0.16,6.0.48),[7.0.0,7.0.73),[8.0.0RC1,8.0.39),[8.5.0,8.5.8),[9.0.0.M1,9.0.0.M11]", "affected_versions": "All versions starting from 6.0.16 before 6.0.48, all versions starting from 7.0.0 before 7.0.73, all versions starting from 8.0.0rc1 before 8.0.39, all versions starting from 8.5.0 before 8.5.8, all versions starting from 9.0.0.m1 up to 9.0.0.m11", "cvss_v2": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "cwe_ids": [ "CWE-1035", "CWE-20", "CWE-79", "CWE-937" ], "date": "2022-07-06", "description": "The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.", "fixed_versions": [ "8.5.8", "9.0.0.M12", "7.0.73", "8.0.39", "6.0.48" ], "identifier": "CVE-2016-6816", "identifiers": [ "GHSA-jc7p-5r39-9477", "CVE-2016-6816" ], "not_impacted": "All versions before 6.0.16, all versions starting from 6.0.48 before 7.0.0, all versions starting from 7.0.73 before 8.0.0rc1, all versions starting from 8.0.39 before 8.5.0, all versions starting from 8.5.8 before 9.0.0.m1, all versions after 9.0.0.m11", "package_slug": "maven/org.apache.tomcat/tomcat", "pubdate": "2022-05-13", "solution": "Upgrade to versions 8.5.8, 9.0.0.M12, 7.0.73, 8.0.39, 6.0.48 or above.", "title": "Improper Input Validation", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2016-6816", "https://access.redhat.com/errata/RHSA-2017:0455", "https://access.redhat.com/errata/RHSA-2017:0456", "https://access.redhat.com/errata/RHSA-2017:0935", "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E", "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E", "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E", "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E", "https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E", "https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E", "https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E", "https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E", "https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E", "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E", "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E", "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E", "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E", "https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E", "https://security.netapp.com/advisory/ntap-20180607-0001/", "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48", "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73", "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39", "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8", "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13", "https://usn.ubuntu.com/4557-1/", "https://www.exploit-db.com/exploits/41783/", "http://rhn.redhat.com/errata/RHSA-2017-0244.html", "http://rhn.redhat.com/errata/RHSA-2017-0245.html", "http://rhn.redhat.com/errata/RHSA-2017-0246.html", "http://rhn.redhat.com/errata/RHSA-2017-0247.html", "http://rhn.redhat.com/errata/RHSA-2017-0250.html", "http://rhn.redhat.com/errata/RHSA-2017-0457.html", "http://rhn.redhat.com/errata/RHSA-2017-0527.html", "http://www.debian.org/security/2016/dsa-3738", "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "https://github.com/advisories/GHSA-jc7p-5r39-9477" ], "uuid": "0501a484-e887-4067-8d59-cf52c608f870" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.39:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.47:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.42:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.44:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.38:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.45:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.43:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.49:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.62:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.53:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.58:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.55:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.63:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.72:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.71:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.59:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.65:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.48:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.67:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.66:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.44:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.69:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.60:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.45:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.68:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.47:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.54:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.61:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.57:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.43:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.56:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.64:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.70:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.38:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:8.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2016-6816" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13", "refsource": "CONFIRM", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13" }, { "name": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8", "refsource": "CONFIRM", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8" }, { "name": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39", "refsource": "CONFIRM", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39" }, { "name": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73", "refsource": "CONFIRM", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73" }, { "name": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48", "refsource": "CONFIRM", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48" }, { "name": "94461", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94461" }, { "name": "1037332", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1037332" }, { "name": "41783", "refsource": "EXPLOIT-DB", "tags": [], "url": "https://www.exploit-db.com/exploits/41783/" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "DSA-3738", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2016/dsa-3738" }, { "name": "RHSA-2017:0935", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2017:0935" }, { "name": "RHSA-2017:0456", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2017:0456" }, { "name": "RHSA-2017:0455", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2017:0455" }, { "name": "RHSA-2017:0527", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0527.html" }, { "name": "RHSA-2017:0457", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0457.html" }, { "name": "RHSA-2017:0250", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0250.html" }, { "name": "RHSA-2017:0247", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0247.html" }, { "name": "RHSA-2017:0246", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0246.html" }, { "name": "RHSA-2017:0245", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0245.html" }, { "name": "RHSA-2017:0244", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0244.html" }, { "name": "https://security.netapp.com/advisory/ntap-20180607-0001/", "refsource": "CONFIRM", "tags": [], "url": "https://security.netapp.com/advisory/ntap-20180607-0001/" }, { "name": "USN-4557-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/4557-1/" }, { "name": "[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/", "refsource": "", "tags": [], "url": "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/", "refsource": "", "tags": [], "url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "refsource": "", "tags": [], "url": "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "refsource": "", "tags": [], "url": "https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "refsource": "", "tags": [], "url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/", "refsource": "", "tags": [], "url": "https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/", "refsource": "", "tags": [], "url": "https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/", "refsource": "", "tags": [], "url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/", "refsource": "", "tags": [], "url": "https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/", "refsource": "", "tags": [], "url": "https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/", "refsource": "", "tags": [], "url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/", "refsource": "", "tags": [], "url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/", "refsource": "", "tags": [], "url": "https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/", "refsource": "", "tags": [], "url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.7 } }, "lastModifiedDate": "2023-12-08T16:41Z", "publishedDate": "2017-03-20T18:59Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…