Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2010-2227 (GCVE-0-2010-2227)
Vulnerability from cvelistv5 – Published: 2010-07-13 17:00 – Updated: 2024-08-07 02:25- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T02:25:07.395Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.novell.com/support/viewContent.do?externalId=7007274"
},
{
"name": "20100709 [SECURITY] CVE-2010-2227: Apache Tomcat Remote Denial Of Service and Information Disclosure Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/512272/100/0/threaded"
},
{
"name": "42079",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/42079"
},
{
"name": "DSA-2207",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2011/dsa-2207"
},
{
"name": "HPSBUX02860",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.novell.com/support/viewContent.do?externalId=7007275"
},
{
"name": "MDVSA-2010:177",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:177"
},
{
"name": "ADV-2010-3056",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/3056"
},
{
"name": "43310",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/43310"
},
{
"name": "RHSA-2010:0581",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0581.html"
},
{
"name": "41544",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/41544"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://tomcat.apache.org/security-7.html"
},
{
"name": "FEDORA-2010-16270",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050214.html"
},
{
"name": "ADV-2010-1986",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/1986"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=959428"
},
{
"name": "44183",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44183"
},
{
"name": "RHSA-2010:0580",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0580.html"
},
{
"name": "41025",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/41025"
},
{
"name": "FEDORA-2010-16248",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050207.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://geronimo.apache.org/22x-security-report.html"
},
{
"name": "40813",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/40813"
},
{
"name": "APPLE-SA-2011-10-12-3",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "MDVSA-2010:176",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
},
{
"name": "42368",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/42368"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "57126",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/57126"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
},
{
"name": "oval:org.mitre.oval:def:18532",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18532"
},
{
"name": "1024180",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1024180"
},
{
"name": "SUSE-SR:2010:017",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=958911"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://tomcat.apache.org/security-5.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"name": "HPSBUX02579",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2"
},
{
"name": "tomcat-transferencoding-dos(60264)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60264"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT5002"
},
{
"name": "RHSA-2010:0582",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0582.html"
},
{
"name": "ADV-2010-2868",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/2868"
},
{
"name": "SSRT101146",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://geronimo.apache.org/21x-security-report.html"
},
{
"name": "42454",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/42454"
},
{
"name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"name": "SSRT100203",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2"
},
{
"name": "HPSBST02955",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=958977"
},
{
"name": "RHSA-2010:0583",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0583.html"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-07-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with \"recycling of a buffer.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-02-13T16:08:41",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.novell.com/support/viewContent.do?externalId=7007274"
},
{
"name": "20100709 [SECURITY] CVE-2010-2227: Apache Tomcat Remote Denial Of Service and Information Disclosure Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/512272/100/0/threaded"
},
{
"name": "42079",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/42079"
},
{
"name": "DSA-2207",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2011/dsa-2207"
},
{
"name": "HPSBUX02860",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.novell.com/support/viewContent.do?externalId=7007275"
},
{
"name": "MDVSA-2010:177",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:177"
},
{
"name": "ADV-2010-3056",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/3056"
},
{
"name": "43310",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/43310"
},
{
"name": "RHSA-2010:0581",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0581.html"
},
{
"name": "41544",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/41544"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://tomcat.apache.org/security-7.html"
},
{
"name": "FEDORA-2010-16270",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050214.html"
},
{
"name": "ADV-2010-1986",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/1986"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=959428"
},
{
"name": "44183",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44183"
},
{
"name": "RHSA-2010:0580",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0580.html"
},
{
"name": "41025",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/41025"
},
{
"name": "FEDORA-2010-16248",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050207.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://geronimo.apache.org/22x-security-report.html"
},
{
"name": "40813",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/40813"
},
{
"name": "APPLE-SA-2011-10-12-3",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "MDVSA-2010:176",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
},
{
"name": "42368",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/42368"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "57126",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/57126"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
},
{
"name": "oval:org.mitre.oval:def:18532",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18532"
},
{
"name": "1024180",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1024180"
},
{
"name": "SUSE-SR:2010:017",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=958911"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://tomcat.apache.org/security-5.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"name": "HPSBUX02579",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2"
},
{
"name": "tomcat-transferencoding-dos(60264)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60264"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT5002"
},
{
"name": "RHSA-2010:0582",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0582.html"
},
{
"name": "ADV-2010-2868",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/2868"
},
{
"name": "SSRT101146",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://geronimo.apache.org/21x-security-report.html"
},
{
"name": "42454",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/42454"
},
{
"name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"name": "SSRT100203",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2"
},
{
"name": "HPSBST02955",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=958977"
},
{
"name": "RHSA-2010:0583",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0583.html"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2227",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with \"recycling of a buffer.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.novell.com/support/viewContent.do?externalId=7007274",
"refsource": "CONFIRM",
"url": "http://www.novell.com/support/viewContent.do?externalId=7007274"
},
{
"name": "20100709 [SECURITY] CVE-2010-2227: Apache Tomcat Remote Denial Of Service and Information Disclosure Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/512272/100/0/threaded"
},
{
"name": "42079",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42079"
},
{
"name": "DSA-2207",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2207"
},
{
"name": "HPSBUX02860",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
},
{
"name": "http://www.novell.com/support/viewContent.do?externalId=7007275",
"refsource": "CONFIRM",
"url": "http://www.novell.com/support/viewContent.do?externalId=7007275"
},
{
"name": "MDVSA-2010:177",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:177"
},
{
"name": "ADV-2010-3056",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3056"
},
{
"name": "43310",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43310"
},
{
"name": "RHSA-2010:0581",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0581.html"
},
{
"name": "41544",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41544"
},
{
"name": "http://tomcat.apache.org/security-7.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-7.html"
},
{
"name": "FEDORA-2010-16270",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050214.html"
},
{
"name": "ADV-2010-1986",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1986"
},
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=959428",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=959428"
},
{
"name": "44183",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44183"
},
{
"name": "RHSA-2010:0580",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0580.html"
},
{
"name": "41025",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41025"
},
{
"name": "FEDORA-2010-16248",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050207.html"
},
{
"name": "http://geronimo.apache.org/22x-security-report.html",
"refsource": "CONFIRM",
"url": "http://geronimo.apache.org/22x-security-report.html"
},
{
"name": "40813",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40813"
},
{
"name": "APPLE-SA-2011-10-12-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "MDVSA-2010:176",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
},
{
"name": "42368",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42368"
},
{
"name": "http://tomcat.apache.org/security-6.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "57126",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57126"
},
{
"name": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
},
{
"name": "oval:org.mitre.oval:def:18532",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18532"
},
{
"name": "1024180",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024180"
},
{
"name": "SUSE-SR:2010:017",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
},
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=958911",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=958911"
},
{
"name": "http://tomcat.apache.org/security-5.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"name": "HPSBUX02579",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2"
},
{
"name": "tomcat-transferencoding-dos(60264)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60264"
},
{
"name": "http://support.apple.com/kb/HT5002",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5002"
},
{
"name": "RHSA-2010:0582",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0582.html"
},
{
"name": "ADV-2010-2868",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2868"
},
{
"name": "SSRT101146",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
},
{
"name": "http://geronimo.apache.org/21x-security-report.html",
"refsource": "CONFIRM",
"url": "http://geronimo.apache.org/21x-security-report.html"
},
{
"name": "42454",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42454"
},
{
"name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"name": "SSRT100203",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2"
},
{
"name": "HPSBST02955",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2"
},
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=958977",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=958977"
},
{
"name": "RHSA-2010:0583",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0583.html"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2010-2227",
"datePublished": "2010-07-13T17:00:00",
"dateReserved": "2010-06-09T00:00:00",
"dateUpdated": "2024-08-07T02:25:07.395Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2010-2227\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2010-07-13T17:30:03.750\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with \\\"recycling of a buffer.\\\"\"},{\"lang\":\"es\",\"value\":\"Apache Tomcat v5.5.0 hasta v5.5.29, v6.0.0 hasta v6.0.27 y v7.0.0 beta, no maneja apropiadamente una cabecera Transer-Encoding inv\u00e1lida, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (indisponibilidad de la aplicaci\u00f3n) u obtener informaci\u00f3n sensible a trav\u00e9s de una cabecera manipulada que interfiera con el \\\"reciclado del b\u00faffer\\\" (\\\"recycling of a buffer\\\").\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:P\",\"baseScore\":6.4,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB203AEC-2A94-48CA-A0E0-B5A8EBF028B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E98B82A-22E5-4E6C-90AE-56F5780EA147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34672E90-C220-436B-9143-480941227933\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92883AFA-A02F-41A5-9977-ABEAC8AD2970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"989A78F8-EE92-465F-8A8D-ECF0B58AFE7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F5B6627-B4A4-4E2D-B96C-CA37CCC8C804\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACFB09F3-32D1-479C-8C39-D7329D9A6623\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D56581E2-9ECD-426A-96D8-A9D958900AD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"717F6995-5AF0-484C-90C0-A82F25FD2E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B0C01D5-773F-469C-9E69-170C2844AAA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB03FDFB-4DBF-4B70-BFA3-570D1DE67695\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F5CF79C-759B-4FF9-90EE-847264059E93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"357651FD-392E-4775-BF20-37A23B3ABAE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585B9476-6B86-4809-9B9E-26112114CB59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6145036D-4FCE-4EBE-A137-BDFA69BA54F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E437055A-0A81-413F-AB08-0E9D0DC9EA30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9276A093-9C98-4617-9941-2276995F5848\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97C9C36C-EF7E-4D42-9749-E2FF6CE35A2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C98575E2-E39A-4A8F-B5B5-BD280B8367BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BDA08E7-A417-44E8-9C89-EB22BEEC3B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCD1B6BE-CF07-4DA8-A703-4A48506C8AD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5878E08E-2741-4798-94E9-BA8E07386B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69F6BAB7-C099-4345-A632-7287AEA555B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3AAF031-D16B-4D51-9581-2D1376A5157B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51120689-F5C0-4DF1-91AA-314C40A46C58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F67477AB-85F6-421C-9C0B-C8EFB1B200CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16D0C265-2ED9-42CF-A7D6-C7FAE4246A1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D70CFD9-B55D-4A29-B94C-D33F3E881A8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1195878-CCC9-49BC-9AC7-1F88F0DFAB82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"375C26A9-623E-483A-BC11-468D9DE278C1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49E3C039-A949-4F1B-892A-57147EECB249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F28C7801-41B9-4552-BA1E-577967BCBBEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25B21085-7259-4685-9D1F-FF98E6489E10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"635EE321-2A1F-4FF8-95BE-0C26591969D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A81B035-8598-4D2C-B45F-C6C9D4B10C2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1096947-82A6-4EA8-A4F2-00D91E3F7DAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EBFA1D3-16A6-4041-BB30-51D2EE0F2AF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B70B372F-EFFD-4AF7-99B5-7D1B23A0C54C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C95ADA4-66F5-45C4-A677-ACE22367A75A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11951A10-39A2-4FF5-8C43-DF94730FB794\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"351E5BCF-A56B-4D91-BA3C-21A4B77D529A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DC2BBB4-171E-4EFF-A575-A5B7FF031755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B6B0504-27C1-4824-A928-A878CBBAB32D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE81AD36-ACD1-4C6C-8E7C-5326D1DA3045\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D903956B-14F5-4177-AF12-0A5F1846D3C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81F847DC-A2F5-456C-9038-16A0E85F4C3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3EBD00-1E1E-452D-AFFB-08A6BD111DDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6B93A3A-D487-4CA1-8257-26F8FE287B8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD8802B2-57E0-4AA6-BC8E-00DE60468569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8461DF95-18DC-4BF5-A703-7F19DA88DC30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F4C9BCF-9C73-4991-B02F-E08C5DA06EBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2823789C-2CB6-4300-94DB-BDBE83ABA8E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5416C76-46ED-4CB1-A7F8-F24EA16DE7F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A61429EE-4331-430C-9830-58DCCBCBCB58\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"33E9607B-4D28-460D-896B-E4B7FA22441E\"}]}]}],\"references\":[{\"url\":\"http://geronimo.apache.org/21x-security-report.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://geronimo.apache.org/22x-security-report.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050207.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050214.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/40813\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/41025\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/42079\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/42368\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/42454\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/43310\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/44183\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/57126\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1024180\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT5002\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=958911\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=958977\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=959428\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://tomcat.apache.org/security-5.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tomcat.apache.org/security-6.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tomcat.apache.org/security-7.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2207\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:176\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:177\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/support/viewContent.do?externalId=7007274\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/support/viewContent.do?externalId=7007275\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0580.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0581.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0582.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0583.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/512272/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/516397/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/41544\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0003.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/1986\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/2868\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/3056\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/60264\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18532\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://geronimo.apache.org/21x-security-report.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://geronimo.apache.org/22x-security-report.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050207.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050214.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/40813\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/41025\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/42079\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/42368\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/42454\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43310\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/44183\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/57126\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1024180\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT5002\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=958911\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=958977\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=959428\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://tomcat.apache.org/security-5.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tomcat.apache.org/security-6.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tomcat.apache.org/security-7.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2207\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:176\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:177\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/support/viewContent.do?externalId=7007274\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/support/viewContent.do?externalId=7007275\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0580.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0581.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0582.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0583.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/512272/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/516397/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/41544\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/1986\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/2868\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/3056\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/60264\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18532\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
RHSA-2010:0583
Vulnerability from csaf_redhat - Published: 2010-08-02 20:17 - Updated: 2025-11-21 17:36Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat5 packages that fix one security issue are now available for\nRed Hat Developer Suite 3.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nA flaw was found in the way Tomcat handled the Transfer-Encoding header in\nHTTP requests. A specially-crafted HTTP request could prevent Tomcat from\nsending replies, or cause Tomcat to return truncated replies, or replies\ncontaining data related to the requests of other users, for all subsequent\nHTTP requests. (CVE-2010-2227)\n\nUsers of Tomcat should upgrade to these updated packages, which contain a\nbackported patch to resolve this issue. Tomcat must be restarted for this\nupdate to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2010:0583",
"url": "https://access.redhat.com/errata/RHSA-2010:0583"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "612799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0583.json"
}
],
"title": "Red Hat Security Advisory: tomcat5 security update",
"tracking": {
"current_release_date": "2025-11-21T17:36:26+00:00",
"generator": {
"date": "2025-11-21T17:36:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2010:0583",
"initial_release_date": "2010-08-02T20:17:00+00:00",
"revision_history": [
{
"date": "2010-08-02T20:17:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2010-08-02T16:17:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:36:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Developer Suite v.3 (AS v.4)",
"product": {
"name": "Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_developer_suite:3"
}
}
},
{
"category": "product_name",
"name": "Red Hat Developer Suite v.3 (ES v.4)",
"product": {
"name": "Red Hat Developer Suite v.3 (ES v.4)",
"product_id": "4ES-DS3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_developer_suite:3"
}
}
},
{
"category": "product_name",
"name": "Red Hat Developer Suite v.3 (WS v.4)",
"product": {
"name": "Red Hat Developer Suite v.3 (WS v.4)",
"product_id": "4WS-DS3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_developer_suite:3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Developer Suite v.3"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp_21rh.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_21rh.noarch",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp_21rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_21rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_21rh.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_21rh.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_21rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_21rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp_21rh.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_21rh.noarch",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp_21rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_21rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_21rh.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_21rh.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_21rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_21rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp_21rh.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_21rh.noarch",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp_21rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_21rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_21rh.noarch",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_21rh.noarch",
"product_id": "tomcat5-0:5.5.23-0jpp_21rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_21rh?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_21rh.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_21rh.src",
"product_id": "tomcat5-0:5.5.23-0jpp_21rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_21rh?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_21rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-0:5.5.23-0jpp_21rh.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_21rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_21rh.src as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-0:5.5.23-0jpp_21rh.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_21rh.src",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_21rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_21rh.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_21rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_21rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_21rh.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_21rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_21rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_21rh.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_21rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_21rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_21rh.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_21rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_21rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_21rh.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_21rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_21rh.noarch as a component of Red Hat Developer Suite v.3 (ES v.4)",
"product_id": "4ES-DS3:tomcat5-0:5.5.23-0jpp_21rh.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_21rh.noarch",
"relates_to_product_reference": "4ES-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_21rh.src as a component of Red Hat Developer Suite v.3 (ES v.4)",
"product_id": "4ES-DS3:tomcat5-0:5.5.23-0jpp_21rh.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_21rh.src",
"relates_to_product_reference": "4ES-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_21rh.noarch as a component of Red Hat Developer Suite v.3 (ES v.4)",
"product_id": "4ES-DS3:tomcat5-common-lib-0:5.5.23-0jpp_21rh.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_21rh.noarch",
"relates_to_product_reference": "4ES-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_21rh.noarch as a component of Red Hat Developer Suite v.3 (ES v.4)",
"product_id": "4ES-DS3:tomcat5-jasper-0:5.5.23-0jpp_21rh.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_21rh.noarch",
"relates_to_product_reference": "4ES-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_21rh.noarch as a component of Red Hat Developer Suite v.3 (ES v.4)",
"product_id": "4ES-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_21rh.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_21rh.noarch",
"relates_to_product_reference": "4ES-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_21rh.noarch as a component of Red Hat Developer Suite v.3 (ES v.4)",
"product_id": "4ES-DS3:tomcat5-server-lib-0:5.5.23-0jpp_21rh.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_21rh.noarch",
"relates_to_product_reference": "4ES-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_21rh.noarch as a component of Red Hat Developer Suite v.3 (ES v.4)",
"product_id": "4ES-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_21rh.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_21rh.noarch",
"relates_to_product_reference": "4ES-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_21rh.noarch as a component of Red Hat Developer Suite v.3 (WS v.4)",
"product_id": "4WS-DS3:tomcat5-0:5.5.23-0jpp_21rh.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_21rh.noarch",
"relates_to_product_reference": "4WS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_21rh.src as a component of Red Hat Developer Suite v.3 (WS v.4)",
"product_id": "4WS-DS3:tomcat5-0:5.5.23-0jpp_21rh.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_21rh.src",
"relates_to_product_reference": "4WS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_21rh.noarch as a component of Red Hat Developer Suite v.3 (WS v.4)",
"product_id": "4WS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_21rh.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_21rh.noarch",
"relates_to_product_reference": "4WS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_21rh.noarch as a component of Red Hat Developer Suite v.3 (WS v.4)",
"product_id": "4WS-DS3:tomcat5-jasper-0:5.5.23-0jpp_21rh.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_21rh.noarch",
"relates_to_product_reference": "4WS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_21rh.noarch as a component of Red Hat Developer Suite v.3 (WS v.4)",
"product_id": "4WS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_21rh.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_21rh.noarch",
"relates_to_product_reference": "4WS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_21rh.noarch as a component of Red Hat Developer Suite v.3 (WS v.4)",
"product_id": "4WS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_21rh.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_21rh.noarch",
"relates_to_product_reference": "4WS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_21rh.noarch as a component of Red Hat Developer Suite v.3 (WS v.4)",
"product_id": "4WS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_21rh.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_21rh.noarch",
"relates_to_product_reference": "4WS-DS3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2010-2227",
"discovery_date": "2010-07-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "612799"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with \"recycling of a buffer.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_21rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_21rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_21rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_21rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_21rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_21rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_21rh.noarch",
"4ES-DS3:tomcat5-0:5.5.23-0jpp_21rh.noarch",
"4ES-DS3:tomcat5-0:5.5.23-0jpp_21rh.src",
"4ES-DS3:tomcat5-common-lib-0:5.5.23-0jpp_21rh.noarch",
"4ES-DS3:tomcat5-jasper-0:5.5.23-0jpp_21rh.noarch",
"4ES-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_21rh.noarch",
"4ES-DS3:tomcat5-server-lib-0:5.5.23-0jpp_21rh.noarch",
"4ES-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_21rh.noarch",
"4WS-DS3:tomcat5-0:5.5.23-0jpp_21rh.noarch",
"4WS-DS3:tomcat5-0:5.5.23-0jpp_21rh.src",
"4WS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_21rh.noarch",
"4WS-DS3:tomcat5-jasper-0:5.5.23-0jpp_21rh.noarch",
"4WS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_21rh.noarch",
"4WS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_21rh.noarch",
"4WS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_21rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-2227"
},
{
"category": "external",
"summary": "RHBZ#612799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-2227",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227"
}
],
"release_date": "2010-07-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-02T20:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_21rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_21rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_21rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_21rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_21rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_21rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_21rh.noarch",
"4ES-DS3:tomcat5-0:5.5.23-0jpp_21rh.noarch",
"4ES-DS3:tomcat5-0:5.5.23-0jpp_21rh.src",
"4ES-DS3:tomcat5-common-lib-0:5.5.23-0jpp_21rh.noarch",
"4ES-DS3:tomcat5-jasper-0:5.5.23-0jpp_21rh.noarch",
"4ES-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_21rh.noarch",
"4ES-DS3:tomcat5-server-lib-0:5.5.23-0jpp_21rh.noarch",
"4ES-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_21rh.noarch",
"4WS-DS3:tomcat5-0:5.5.23-0jpp_21rh.noarch",
"4WS-DS3:tomcat5-0:5.5.23-0jpp_21rh.src",
"4WS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_21rh.noarch",
"4WS-DS3:tomcat5-jasper-0:5.5.23-0jpp_21rh.noarch",
"4WS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_21rh.noarch",
"4WS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_21rh.noarch",
"4WS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_21rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0583"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_21rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_21rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_21rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_21rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_21rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_21rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_21rh.noarch",
"4ES-DS3:tomcat5-0:5.5.23-0jpp_21rh.noarch",
"4ES-DS3:tomcat5-0:5.5.23-0jpp_21rh.src",
"4ES-DS3:tomcat5-common-lib-0:5.5.23-0jpp_21rh.noarch",
"4ES-DS3:tomcat5-jasper-0:5.5.23-0jpp_21rh.noarch",
"4ES-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_21rh.noarch",
"4ES-DS3:tomcat5-server-lib-0:5.5.23-0jpp_21rh.noarch",
"4ES-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_21rh.noarch",
"4WS-DS3:tomcat5-0:5.5.23-0jpp_21rh.noarch",
"4WS-DS3:tomcat5-0:5.5.23-0jpp_21rh.src",
"4WS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_21rh.noarch",
"4WS-DS3:tomcat5-jasper-0:5.5.23-0jpp_21rh.noarch",
"4WS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_21rh.noarch",
"4WS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_21rh.noarch",
"4WS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_21rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header"
}
]
}
RHSA-2010:0580
Vulnerability from csaf_redhat - Published: 2010-08-02 20:00 - Updated: 2025-11-21 17:36Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat5 packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nA flaw was found in the way Tomcat handled the Transfer-Encoding header in\nHTTP requests. A specially-crafted HTTP request could prevent Tomcat from\nsending replies, or cause Tomcat to return truncated replies, or replies\ncontaining data related to the requests of other users, for all subsequent\nHTTP requests. (CVE-2010-2227)\n\nThe Tomcat security update RHSA-2009:1164 did not, unlike the erratum text\nstated, provide a fix for CVE-2009-0781, a cross-site scripting (XSS) flaw\nin the examples calendar application. With some web browsers, remote\nattackers could use this flaw to inject arbitrary web script or HTML via\nthe \"time\" parameter. (CVE-2009-2696)\n\nTwo directory traversal flaws were found in the Tomcat deployment process.\nA specially-crafted WAR file could, when deployed, cause a file to be\ncreated outside of the web root into any directory writable by the Tomcat\nuser, or could lead to the deletion of files in the Tomcat host\u0027s work\ndirectory. (CVE-2009-2693, CVE-2009-2902)\n\nUsers of Tomcat should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Tomcat must be restarted for\nthis update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2010:0580",
"url": "https://access.redhat.com/errata/RHSA-2010:0580"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "559738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
},
{
"category": "external",
"summary": "559761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
},
{
"category": "external",
"summary": "612799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
},
{
"category": "external",
"summary": "616717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=616717"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0580.json"
}
],
"title": "Red Hat Security Advisory: tomcat5 security update",
"tracking": {
"current_release_date": "2025-11-21T17:36:26+00:00",
"generator": {
"date": "2025-11-21T17:36:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2010:0580",
"initial_release_date": "2010-08-02T20:00:00+00:00",
"revision_history": [
{
"date": "2010-08-02T20:00:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2010-08-02T16:00:06+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:36:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.9.el5_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.9.el5_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.9.el5_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.9.el5_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_id": "tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.9.el5_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.9.el5_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.9.el5_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.9.el5_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.9.el5_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.9.el5_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.9.el5_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.9.el5_5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.9.el5_5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.9.el5_5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.9.el5_5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.9.el5_5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"product_id": "tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.9.el5_5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.9.el5_5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.9.el5_5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.9.el5_5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.9.el5_5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.9.el5_5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.9.el5_5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.9.el5_5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"product_id": "tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.9.el5_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.9.el5_5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.9.el5_5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.9.el5_5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.9.el5_5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.9.el5_5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"product_id": "tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.9.el5_5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.9.el5_5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.9.el5_5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.9.el5_5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.9.el5_5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.9.el5_5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.9.el5_5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.9.el5_5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.9.el5_5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.9.el5_5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.9.el5_5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.9.el5_5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"product_id": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.9.el5_5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.9.el5_5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.9.el5_5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.9.el5_5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.9.el5_5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.9.el5_5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.9.el5_5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"product_id": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.9.el5_5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.9.el5_5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.9.el5_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.9.el5_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.9.el5_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.9.el5_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.9.el5_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"product_id": "tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.9.el5_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.9.el5_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.9.el5_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.9.el5_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.9.el5_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.9.el5_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.9.el5_5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-2693",
"discovery_date": "2010-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "559738"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: unexpected file deletion and/or alteration",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2693"
},
{
"category": "external",
"summary": "RHBZ#559738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693"
}
],
"release_date": "2010-01-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-02T20:00:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0580"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: unexpected file deletion and/or alteration"
},
{
"cve": "CVE-2009-2696",
"discovery_date": "2009-08-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "616717"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat on Red Hat Enterprise Linux 5, Desktop Workstation 5, and Linux Desktop 5 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to \"invalid HTML.\" NOTE: this is due to a missing fix for CVE-2009-0781.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: missing fix for CVE-2009-0781",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2696"
},
{
"category": "external",
"summary": "RHBZ#616717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=616717"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2696",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2696"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2696",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2696"
}
],
"release_date": "2010-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-02T20:00:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0580"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: missing fix for CVE-2009-0781"
},
{
"cve": "CVE-2009-2902",
"discovery_date": "2010-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "559761"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: unexpected file deletion in work directory",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2902"
},
{
"category": "external",
"summary": "RHBZ#559761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2902",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902"
}
],
"release_date": "2010-01-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-02T20:00:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0580"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: unexpected file deletion in work directory"
},
{
"cve": "CVE-2010-2227",
"discovery_date": "2010-07-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "612799"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with \"recycling of a buffer.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-2227"
},
{
"category": "external",
"summary": "RHBZ#612799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-2227",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227"
}
],
"release_date": "2010-07-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-02T20:00:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0580"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
"5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header"
}
]
}
RHSA-2010:0581
Vulnerability from csaf_redhat - Published: 2010-08-02 20:39 - Updated: 2025-11-21 17:36Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat5 and tomcat6 packages that fix one security issue are now\navailable for JBoss Enterprise Web Server 1.0.1 for Red Hat Enterprise\nLinux 4 and 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nA flaw was found in the way Tomcat handled the Transfer-Encoding header in\nHTTP requests. A specially-crafted HTTP request could prevent Tomcat from\nsending replies, or cause Tomcat to return truncated replies, or replies\ncontaining data related to the requests of other users, for all subsequent\nHTTP requests. (CVE-2010-2227)\n\nUsers of Tomcat should upgrade to these updated packages, which contain a\nbackported patch to resolve this issue. Tomcat must be restarted for this\nupdate to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2010:0581",
"url": "https://access.redhat.com/errata/RHSA-2010:0581"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-6.html",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"category": "external",
"summary": "612799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0581.json"
}
],
"title": "Red Hat Security Advisory: tomcat5 and tomcat6 security update",
"tracking": {
"current_release_date": "2025-11-21T17:36:26+00:00",
"generator": {
"date": "2025-11-21T17:36:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2010:0581",
"initial_release_date": "2010-08-02T20:39:00+00:00",
"revision_history": [
{
"date": "2010-08-02T20:39:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2010-08-02T16:39:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:36:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product": {
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product": {
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-lib@6.0.24-7.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.24-7.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.24-7.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.24-7.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.24-7.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.24-7.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.24-7.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.24-7.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.24-7.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.24-7.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat5-server-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.28-9.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-eclipse@5.5.28-9.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat5-admin-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.28-9.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.28-9.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat5-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat5-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.28-9.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat5-common-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.28-9.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.28-9.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat5-jasper-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.28-9.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.28-9.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.28-9.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-parent-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat5-parent-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat5-parent-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-parent@5.5.28-9.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.28-9.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.28-9.patch_01.jdk6.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product_id": "tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-lib@6.0.24-7.patch_01.jdk6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product_id": "tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.24-7.patch_01.jdk6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product_id": "tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.24-7.patch_01.jdk6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product_id": "tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.24-7.patch_01.jdk6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product_id": "tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.24-7.patch_01.jdk6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product_id": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.24-7.patch_01.jdk6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product_id": "tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.24-7.patch_01.jdk6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product_id": "tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.24-7.patch_01.jdk6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product_id": "tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.24-7.patch_01.jdk6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product_id": "tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.24-7.patch_01.jdk6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_id": "tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-eclipse@5.5.28-9.patch_01.1.jdk6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.28-9.patch_01.1.jdk6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_id": "tomcat5-common-lib-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.28-9.patch_01.1.jdk6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat5-webapps-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_id": "tomcat5-webapps-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.28-9.patch_01.1.jdk6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.28-9.patch_01.1.jdk6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_id": "tomcat5-jasper-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.28-9.patch_01.1.jdk6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.28-9.patch_01.1.jdk6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_id": "tomcat5-server-lib-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.28-9.patch_01.1.jdk6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_id": "tomcat5-admin-webapps-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.28-9.patch_01.1.jdk6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.28-9.patch_01.1.jdk6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat5-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_id": "tomcat5-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.28-9.patch_01.1.jdk6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_id": "tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.28-9.patch_01.1.jdk6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-parent-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product": {
"name": "tomcat5-parent-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_id": "tomcat5-parent-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-parent@5.5.28-9.patch_01.1.jdk6.ep5.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.src",
"product": {
"name": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.src",
"product_id": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.24-7.patch_01.jdk6.ep5.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.src",
"product": {
"name": "tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.src",
"product_id": "tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.28-9.patch_01.jdk6.ep5.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el5.src",
"product": {
"name": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el5.src",
"product_id": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.24-7.patch_01.jdk6.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.src",
"product": {
"name": "tomcat5-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.src",
"product_id": "tomcat5-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.28-9.patch_01.1.jdk6.ep5.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.src"
},
"product_reference": "tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.src",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-parent-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-parent-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.src"
},
"product_reference": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.src",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.src"
},
"product_reference": "tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.src",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-parent-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-parent-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.src"
},
"product_reference": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.src",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat5-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.src"
},
"product_reference": "tomcat5-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-parent-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat5-parent-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el5.src"
},
"product_reference": "tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2010-2227",
"discovery_date": "2010-07-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "612799"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with \"recycling of a buffer.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-2227"
},
{
"category": "external",
"summary": "RHBZ#612799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-2227",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227"
}
],
"release_date": "2010-07-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-02T20:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0581"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.jdk6.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-9.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-9.patch_01.1.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-7.patch_01.jdk6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-7.patch_01.jdk6.ep5.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header"
}
]
}
RHSA-2010:0693
Vulnerability from csaf_redhat - Published: 2010-09-10 08:34 - Updated: 2025-11-21 17:36Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat5 packages that fix three security issues are now available\nfor Red Hat Certificate System 7.3.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nA flaw was found in the way Tomcat handled the Transfer-Encoding header in\nHTTP requests. A specially-crafted HTTP request could prevent Tomcat from\nsending replies, or cause Tomcat to return truncated replies, or replies\ncontaining data related to the requests of other users, for all subsequent\nHTTP requests. (CVE-2010-2227)\n\nThis erratum fixes two additional security flaws in Tomcat. In a typical\noperating environment, Tomcat is not exposed to users of Red Hat\nCertificate System in a vulnerable manner. These fixes will reduce risk in\nunique Certificate System environments. (CVE-2009-2693, CVE-2009-2902)\n\nUsers of Red Hat Certificate System 7.3 should upgrade to these updated\ntomcat5 packages, which contain backported patches to correct these issues.\nAfter installing the updated packages, the Red Hat Certificate System CA\n(rhpki-ca), DRM (rhpki-kra), OCSP (rhpki-ocsp), and TKS (rhpki-tks)\nsubsystems must be restarted (\"/etc/init.d/[instance-name] restart\") for\nthis update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2010:0693",
"url": "https://access.redhat.com/errata/RHSA-2010:0693"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#important",
"url": "http://www.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "559738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
},
{
"category": "external",
"summary": "559761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
},
{
"category": "external",
"summary": "612799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0693.json"
}
],
"title": "Red Hat Security Advisory: tomcat5 security update",
"tracking": {
"current_release_date": "2025-11-21T17:36:40+00:00",
"generator": {
"date": "2025-11-21T17:36:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2010:0693",
"initial_release_date": "2010-09-10T08:34:00+00:00",
"revision_history": [
{
"date": "2010-09-10T08:34:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2010-09-10T04:37:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:36:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Certificate System 7.3 for 4AS",
"product": {
"name": "Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:certificate_system:7.3"
}
}
},
{
"category": "product_name",
"name": "Red Hat Certificate System 7.3 for 4ES",
"product": {
"name": "Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:certificate_system:7.3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Certificate System"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_4rh.19?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_4rh.19?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_4rh.19?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_4rh.19?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"product_id": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.19?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_4rh.19?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_4rh.19.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.19.src",
"product_id": "tomcat5-0:5.5.23-0jpp_4rh.19.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.19?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.19.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.19.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.19.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.19.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-2693",
"discovery_date": "2010-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "559738"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: unexpected file deletion and/or alteration",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2693"
},
{
"category": "external",
"summary": "RHBZ#559738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693"
}
],
"release_date": "2010-01-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-09-10T08:34:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0693"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: unexpected file deletion and/or alteration"
},
{
"cve": "CVE-2009-2902",
"discovery_date": "2010-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "559761"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: unexpected file deletion in work directory",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2902"
},
{
"category": "external",
"summary": "RHBZ#559761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2902",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902"
}
],
"release_date": "2010-01-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-09-10T08:34:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0693"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: unexpected file deletion in work directory"
},
{
"cve": "CVE-2010-2227",
"discovery_date": "2010-07-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "612799"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with \"recycling of a buffer.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-2227"
},
{
"category": "external",
"summary": "RHBZ#612799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-2227",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227"
}
],
"release_date": "2010-07-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-09-10T08:34:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0693"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header"
}
]
}
RHSA-2010:0584
Vulnerability from csaf_redhat - Published: 2010-08-02 20:18 - Updated: 2025-11-21 17:36Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated jbossweb package that fixes two security issues is now available\nfor JBoss Enterprise Application Platform 4.2 and 4.3 for Red Hat\nEnterprise Linux 4 and 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Web is the web container, based on Apache Tomcat, in JBoss Enterprise\nApplication Platform. It provides a single deployment platform for the\nJavaServer Pages (JSP) and Java Servlet technologies, Microsoft .NET, PHP,\nand CGI.\n\nA flaw was found in the way JBoss Web handled the Transfer-Encoding header\nin HTTP requests. A specially-crafted HTTP request could prevent JBoss Web\nfrom sending replies, or cause JBoss Web to return truncated replies, or\nreplies containing data related to the requests of other users, for all\nsubsequent HTTP requests. (CVE-2010-2227)\n\nA possible minor information leak was found in the way JBoss Web generated\nHTTP BASIC and DIGEST authentication requests. For configurations where a\nrealm name was not specified and JBoss Web was accessed via a proxy, the\ndefault generated realm contained the hostname and port used by the proxy\nto send requests to the JBoss Web server. (CVE-2010-1157)\n\nUsers of JBoss Web should upgrade to this updated package, which upgrades\nJBoss Web to version 2.0.0.CP14, and resolves these issues. The JBoss\nserver process must be restarted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2010:0584",
"url": "https://access.redhat.com/errata/RHSA-2010:0584"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-6.html",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"category": "external",
"summary": "585331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=585331"
},
{
"category": "external",
"summary": "612799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0584.json"
}
],
"title": "Red Hat Security Advisory: jbossweb security update",
"tracking": {
"current_release_date": "2025-11-21T17:36:30+00:00",
"generator": {
"date": "2025-11-21T17:36:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2010:0584",
"initial_release_date": "2010-08-02T20:18:00+00:00",
"revision_history": [
{
"date": "2010-08-02T20:18:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2010-08-02T16:18:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:36:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"product": {
"name": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"product_id": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP14.0jpp.ep1.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.src",
"product": {
"name": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.src",
"product_id": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP14.0jpp.ep1.1.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"product": {
"name": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"product_id": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP14.0jpp.ep1.1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.noarch",
"product": {
"name": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.noarch",
"product_id": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP14.0jpp.ep1.1.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.noarch"
},
"product_reference": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.src"
},
"product_reference": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.noarch"
},
"product_reference": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.src"
},
"product_reference": "jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2010-1157",
"discovery_date": "2010-04-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "585331"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server\u0027s hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: information disclosure in authentication headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The risks associated with fixing this flaw are greater than the low severity security risk. We therefore have no plans to fix this flaw. The information leak can be avoided by adjusting the configuration to always specify a realm-name.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-1157"
},
{
"category": "external",
"summary": "RHBZ#585331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=585331"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-1157",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1157"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1157",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1157"
}
],
"release_date": "2010-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-02T20:18:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0584"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: information disclosure in authentication headers"
},
{
"cve": "CVE-2010-2227",
"discovery_date": "2010-07-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "612799"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with \"recycling of a buffer.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-2227"
},
{
"category": "external",
"summary": "RHBZ#612799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-2227",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227"
}
],
"release_date": "2010-07-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-02T20:18:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0584"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el4.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP14.0jpp.ep1.1.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header"
}
]
}
RHSA-2010:0582
Vulnerability from csaf_redhat - Published: 2010-08-02 20:17 - Updated: 2025-11-21 17:36Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat5 packages that fix three security issues are now available\nfor Red Hat Application Server v2.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nA flaw was found in the way Tomcat handled the Transfer-Encoding header in\nHTTP requests. A specially-crafted HTTP request could prevent Tomcat from\nsending replies, or cause Tomcat to return truncated replies, or replies\ncontaining data related to the requests of other users, for all subsequent\nHTTP requests. (CVE-2010-2227)\n\nTwo directory traversal flaws were found in the Tomcat deployment process.\nA specially-crafted WAR file could, when deployed, cause a file to be\ncreated outside of the web root into any directory writable by the Tomcat\nuser, or could lead to the deletion of files in the Tomcat host\u0027s work\ndirectory. (CVE-2009-2693, CVE-2009-2902)\n\nUsers of Tomcat should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Tomcat must be restarted for\nthis update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2010:0582",
"url": "https://access.redhat.com/errata/RHSA-2010:0582"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "559738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
},
{
"category": "external",
"summary": "559761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
},
{
"category": "external",
"summary": "612799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0582.json"
}
],
"title": "Red Hat Security Advisory: tomcat5 security update",
"tracking": {
"current_release_date": "2025-11-21T17:36:26+00:00",
"generator": {
"date": "2025-11-21T17:36:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2010:0582",
"initial_release_date": "2010-08-02T20:17:00+00:00",
"revision_history": [
{
"date": "2010-08-02T20:17:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2010-08-02T16:17:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:36:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Application Server v2 4AS",
"product": {
"name": "Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
},
{
"category": "product_name",
"name": "Red Hat Application Server v2 4ES",
"product": {
"name": "Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
},
{
"category": "product_name",
"name": "Red Hat Application Server v2 4WS",
"product": {
"name": "Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
}
],
"category": "product_family",
"name": "Red Hat Application Server"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_4rh.17?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp_4rh.17?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp_4rh.17?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp_4rh.17?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_4rh.17?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_4rh.17?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"product_id": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.17?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_4rh.17?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp_4rh.17?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_4rh.17?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp_4rh.17?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
"product_id": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.17?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.17.src as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.17.src as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.17.src as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-2693",
"discovery_date": "2010-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "559738"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: unexpected file deletion and/or alteration",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2693"
},
{
"category": "external",
"summary": "RHBZ#559738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693"
}
],
"release_date": "2010-01-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-02T20:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0582"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: unexpected file deletion and/or alteration"
},
{
"cve": "CVE-2009-2902",
"discovery_date": "2010-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "559761"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: unexpected file deletion in work directory",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2902"
},
{
"category": "external",
"summary": "RHBZ#559761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2902",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902"
}
],
"release_date": "2010-01-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-02T20:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0582"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: unexpected file deletion in work directory"
},
{
"cve": "CVE-2010-2227",
"discovery_date": "2010-07-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "612799"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with \"recycling of a buffer.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-2227"
},
{
"category": "external",
"summary": "RHBZ#612799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-2227",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227"
}
],
"release_date": "2010-07-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-02T20:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0582"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header"
}
]
}
FKIE_CVE-2010-2227
Vulnerability from fkie_nvd - Published: 2010-07-13 17:30 - Updated: 2025-04-11 00:51| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://geronimo.apache.org/21x-security-report.html | ||
| secalert@redhat.com | http://geronimo.apache.org/22x-security-report.html | ||
| secalert@redhat.com | http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050207.html | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050214.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html | ||
| secalert@redhat.com | http://marc.info/?l=bugtraq&m=129070310906557&w=2 | ||
| secalert@redhat.com | http://marc.info/?l=bugtraq&m=136485229118404&w=2 | ||
| secalert@redhat.com | http://marc.info/?l=bugtraq&m=139344343412337&w=2 | ||
| secalert@redhat.com | http://secunia.com/advisories/40813 | ||
| secalert@redhat.com | http://secunia.com/advisories/41025 | ||
| secalert@redhat.com | http://secunia.com/advisories/42079 | ||
| secalert@redhat.com | http://secunia.com/advisories/42368 | ||
| secalert@redhat.com | http://secunia.com/advisories/42454 | ||
| secalert@redhat.com | http://secunia.com/advisories/43310 | ||
| secalert@redhat.com | http://secunia.com/advisories/44183 | ||
| secalert@redhat.com | http://secunia.com/advisories/57126 | ||
| secalert@redhat.com | http://securitytracker.com/id?1024180 | ||
| secalert@redhat.com | http://support.apple.com/kb/HT5002 | ||
| secalert@redhat.com | http://svn.apache.org/viewvc?view=revision&revision=958911 | Patch | |
| secalert@redhat.com | http://svn.apache.org/viewvc?view=revision&revision=958977 | Patch | |
| secalert@redhat.com | http://svn.apache.org/viewvc?view=revision&revision=959428 | Patch | |
| secalert@redhat.com | http://tomcat.apache.org/security-5.html | Vendor Advisory | |
| secalert@redhat.com | http://tomcat.apache.org/security-6.html | Vendor Advisory | |
| secalert@redhat.com | http://tomcat.apache.org/security-7.html | Vendor Advisory | |
| secalert@redhat.com | http://www.debian.org/security/2011/dsa-2207 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2010:176 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2010:177 | ||
| secalert@redhat.com | http://www.novell.com/support/viewContent.do?externalId=7007274 | ||
| secalert@redhat.com | http://www.novell.com/support/viewContent.do?externalId=7007275 | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2010-0580.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2010-0581.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2010-0582.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2010-0583.html | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/512272/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/516397/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/41544 | ||
| secalert@redhat.com | http://www.vmware.com/security/advisories/VMSA-2011-0003.html | ||
| secalert@redhat.com | http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2010/1986 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2010/2868 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2010/3056 | ||
| secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/60264 | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18532 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://geronimo.apache.org/21x-security-report.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://geronimo.apache.org/22x-security-report.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050207.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050214.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=129070310906557&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=136485229118404&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=139344343412337&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/40813 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/41025 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42079 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42368 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42454 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43310 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44183 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/57126 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1024180 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT5002 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/viewvc?view=revision&revision=958911 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/viewvc?view=revision&revision=958977 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/viewvc?view=revision&revision=959428 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://tomcat.apache.org/security-5.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://tomcat.apache.org/security-6.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://tomcat.apache.org/security-7.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2011/dsa-2207 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2010:176 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2010:177 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/support/viewContent.do?externalId=7007274 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/support/viewContent.do?externalId=7007275 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2010-0580.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2010-0581.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2010-0582.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2010-0583.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/512272/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/516397/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/41544 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2011-0003.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1986 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2868 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/3056 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/60264 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18532 |
| Vendor | Product | Version | |
|---|---|---|---|
| apache | tomcat | 5.5.0 | |
| apache | tomcat | 5.5.1 | |
| apache | tomcat | 5.5.2 | |
| apache | tomcat | 5.5.3 | |
| apache | tomcat | 5.5.4 | |
| apache | tomcat | 5.5.5 | |
| apache | tomcat | 5.5.6 | |
| apache | tomcat | 5.5.7 | |
| apache | tomcat | 5.5.8 | |
| apache | tomcat | 5.5.9 | |
| apache | tomcat | 5.5.10 | |
| apache | tomcat | 5.5.11 | |
| apache | tomcat | 5.5.12 | |
| apache | tomcat | 5.5.13 | |
| apache | tomcat | 5.5.14 | |
| apache | tomcat | 5.5.15 | |
| apache | tomcat | 5.5.16 | |
| apache | tomcat | 5.5.17 | |
| apache | tomcat | 5.5.18 | |
| apache | tomcat | 5.5.19 | |
| apache | tomcat | 5.5.20 | |
| apache | tomcat | 5.5.21 | |
| apache | tomcat | 5.5.22 | |
| apache | tomcat | 5.5.23 | |
| apache | tomcat | 5.5.24 | |
| apache | tomcat | 5.5.25 | |
| apache | tomcat | 5.5.26 | |
| apache | tomcat | 5.5.27 | |
| apache | tomcat | 5.5.28 | |
| apache | tomcat | 5.5.29 | |
| apache | tomcat | 6.0.0 | |
| apache | tomcat | 6.0.1 | |
| apache | tomcat | 6.0.2 | |
| apache | tomcat | 6.0.3 | |
| apache | tomcat | 6.0.4 | |
| apache | tomcat | 6.0.5 | |
| apache | tomcat | 6.0.6 | |
| apache | tomcat | 6.0.7 | |
| apache | tomcat | 6.0.8 | |
| apache | tomcat | 6.0.9 | |
| apache | tomcat | 6.0.10 | |
| apache | tomcat | 6.0.11 | |
| apache | tomcat | 6.0.12 | |
| apache | tomcat | 6.0.13 | |
| apache | tomcat | 6.0.14 | |
| apache | tomcat | 6.0.15 | |
| apache | tomcat | 6.0.16 | |
| apache | tomcat | 6.0.17 | |
| apache | tomcat | 6.0.18 | |
| apache | tomcat | 6.0.19 | |
| apache | tomcat | 6.0.20 | |
| apache | tomcat | 6.0.24 | |
| apache | tomcat | 6.0.26 | |
| apache | tomcat | 6.0.27 | |
| apache | tomcat | 7.0.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EB203AEC-2A94-48CA-A0E0-B5A8EBF028B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6E98B82A-22E5-4E6C-90AE-56F5780EA147",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "34672E90-C220-436B-9143-480941227933",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "92883AFA-A02F-41A5-9977-ABEAC8AD2970",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "989A78F8-EE92-465F-8A8D-ECF0B58AFE7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1F5B6627-B4A4-4E2D-B96C-CA37CCC8C804",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ACFB09F3-32D1-479C-8C39-D7329D9A6623",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D56581E2-9ECD-426A-96D8-A9D958900AD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "717F6995-5AF0-484C-90C0-A82F25FD2E32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C01D5-773F-469C-9E69-170C2844AAA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "EB03FDFB-4DBF-4B70-BFA3-570D1DE67695",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9F5CF79C-759B-4FF9-90EE-847264059E93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "357651FD-392E-4775-BF20-37A23B3ABAE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "585B9476-6B86-4809-9B9E-26112114CB59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*",
"matchCriteriaId": "6145036D-4FCE-4EBE-A137-BDFA69BA54F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E437055A-0A81-413F-AB08-0E9D0DC9EA30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9276A093-9C98-4617-9941-2276995F5848",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "97C9C36C-EF7E-4D42-9749-E2FF6CE35A2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*",
"matchCriteriaId": "C98575E2-E39A-4A8F-B5B5-BD280B8367BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*",
"matchCriteriaId": "5BDA08E7-A417-44E8-9C89-EB22BEEC3B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD1B6BE-CF07-4DA8-A703-4A48506C8AD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*",
"matchCriteriaId": "5878E08E-2741-4798-94E9-BA8E07386B12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*",
"matchCriteriaId": "69F6BAB7-C099-4345-A632-7287AEA555B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*",
"matchCriteriaId": "F3AAF031-D16B-4D51-9581-2D1376A5157B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*",
"matchCriteriaId": "51120689-F5C0-4DF1-91AA-314C40A46C58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*",
"matchCriteriaId": "F67477AB-85F6-421C-9C0B-C8EFB1B200CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*",
"matchCriteriaId": "16D0C265-2ED9-42CF-A7D6-C7FAE4246A1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*",
"matchCriteriaId": "5D70CFD9-B55D-4A29-B94C-D33F3E881A8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:*",
"matchCriteriaId": "C1195878-CCC9-49BC-9AC7-1F88F0DFAB82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.29:*:*:*:*:*:*:*",
"matchCriteriaId": "375C26A9-623E-483A-BC11-468D9DE278C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "49E3C039-A949-4F1B-892A-57147EECB249",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F28C7801-41B9-4552-BA1E-577967BCBBEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "25B21085-7259-4685-9D1F-FF98E6489E10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "635EE321-2A1F-4FF8-95BE-0C26591969D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9A81B035-8598-4D2C-B45F-C6C9D4B10C2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E1096947-82A6-4EA8-A4F2-00D91E3F7DAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0EBFA1D3-16A6-4041-BB30-51D2EE0F2AF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B70B372F-EFFD-4AF7-99B5-7D1B23A0C54C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "9C95ADA4-66F5-45C4-A677-ACE22367A75A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "11951A10-39A2-4FF5-8C43-DF94730FB794",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "351E5BCF-A56B-4D91-BA3C-21A4B77D529A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2DC2BBB4-171E-4EFF-A575-A5B7FF031755",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6B6B0504-27C1-4824-A928-A878CBBAB32D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "CE81AD36-ACD1-4C6C-8E7C-5326D1DA3045",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "D903956B-14F5-4177-AF12-0A5F1846D3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "81F847DC-A2F5-456C-9038-16A0E85F4C3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "AF3EBD00-1E1E-452D-AFFB-08A6BD111DDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "C6B93A3A-D487-4CA1-8257-26F8FE287B8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "BD8802B2-57E0-4AA6-BC8E-00DE60468569",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "8461DF95-18DC-4BF5-A703-7F19DA88DC30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "1F4C9BCF-9C73-4991-B02F-E08C5DA06EBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*",
"matchCriteriaId": "2823789C-2CB6-4300-94DB-BDBE83ABA8E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*",
"matchCriteriaId": "C5416C76-46ED-4CB1-A7F8-F24EA16DE7F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*",
"matchCriteriaId": "A61429EE-4331-430C-9830-58DCCBCBCB58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "33E9607B-4D28-460D-896B-E4B7FA22441E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with \"recycling of a buffer.\""
},
{
"lang": "es",
"value": "Apache Tomcat v5.5.0 hasta v5.5.29, v6.0.0 hasta v6.0.27 y v7.0.0 beta, no maneja apropiadamente una cabecera Transer-Encoding inv\u00e1lida, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (indisponibilidad de la aplicaci\u00f3n) u obtener informaci\u00f3n sensible a trav\u00e9s de una cabecera manipulada que interfiera con el \"reciclado del b\u00faffer\" (\"recycling of a buffer\")."
}
],
"id": "CVE-2010-2227",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-07-13T17:30:03.750",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://geronimo.apache.org/21x-security-report.html"
},
{
"source": "secalert@redhat.com",
"url": "http://geronimo.apache.org/22x-security-report.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050207.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050214.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/40813"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/41025"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/42079"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/42368"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/42454"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/43310"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/44183"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/57126"
},
{
"source": "secalert@redhat.com",
"url": "http://securitytracker.com/id?1024180"
},
{
"source": "secalert@redhat.com",
"url": "http://support.apple.com/kb/HT5002"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=958911"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=958977"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=959428"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-5.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-7.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2011/dsa-2207"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:177"
},
{
"source": "secalert@redhat.com",
"url": "http://www.novell.com/support/viewContent.do?externalId=7007274"
},
{
"source": "secalert@redhat.com",
"url": "http://www.novell.com/support/viewContent.do?externalId=7007275"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0580.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0581.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0582.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0583.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/512272/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/41544"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2010/1986"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2010/2868"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2010/3056"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60264"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18532"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://geronimo.apache.org/21x-security-report.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://geronimo.apache.org/22x-security-report.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050207.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050214.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/40813"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/41025"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/42079"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/42368"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/42454"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/43310"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/44183"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/57126"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1024180"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT5002"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=958911"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=958977"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=959428"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-5.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-7.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2011/dsa-2207"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:177"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.novell.com/support/viewContent.do?externalId=7007274"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.novell.com/support/viewContent.do?externalId=7007275"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0580.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0581.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0582.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0583.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/512272/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/41544"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2010/1986"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2010/2868"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2010/3056"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60264"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18532"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-CXG2-49RQ-8GCR
Vulnerability from github – Published: 2022-05-14 01:17 – Updated: 2024-02-21 23:23Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with "recycling of a buffer."
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.tomcat:tomcat"
},
"ranges": [
{
"events": [
{
"introduced": "7.0.0"
},
{
"fixed": "7.0.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.tomcat:tomcat"
},
"ranges": [
{
"events": [
{
"introduced": "5.5.0"
},
{
"fixed": "5.5.30"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.tomcat:tomcat"
},
"ranges": [
{
"events": [
{
"introduced": "6.0.0"
},
{
"fixed": "6.0.28"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2010-2227"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": true,
"github_reviewed_at": "2024-02-21T23:23:28Z",
"nvd_published_at": "2010-07-13T17:30:00Z",
"severity": "MODERATE"
},
"details": "Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with \"recycling of a buffer.\"",
"id": "GHSA-cxg2-49rq-8gcr",
"modified": "2024-02-21T23:23:29Z",
"published": "2022-05-14T01:17:03Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227"
},
{
"type": "WEB",
"url": "https://github.com/apache/tomcat/commit/40e5880dfc51517334acda5f12beacdec52ca283"
},
{
"type": "WEB",
"url": "https://github.com/apache/tomcat55/commit/4faaca9353e5e3f963c7a674b3ac6a0bd1c3757e"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20161107200417/http://securitytracker.com/id?1024180"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20140723000733/http://secunia.com/advisories/57126"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20111119150528/http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20110906004746/http://www.securityfocus.com/bid/41544"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20110716102842/http://www.securityfocus.com/archive/1/512272/100/0/threaded"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20110713184518/http://secunia.com/advisories/44183"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20110712000328/http://secunia.com/advisories/42368"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20110220104430/http://secunia.com/advisories/42454"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20110220104426/http://secunia.com/advisories/41025"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20110220104410/http://secunia.com/advisories/40813"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20110220095703/http://secunia.com/advisories/42079"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20110213053623/http://secunia.com/advisories/43310"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18532"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/tomcat"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60264"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2010:0583"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2010:0582"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2010:0581"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2010:0580"
},
{
"type": "WEB",
"url": "http://geronimo.apache.org/21x-security-report.html"
},
{
"type": "WEB",
"url": "http://geronimo.apache.org/22x-security-report.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050207.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050214.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT5002"
},
{
"type": "WEB",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=958911"
},
{
"type": "WEB",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=958977"
},
{
"type": "WEB",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=959428"
},
{
"type": "WEB",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"type": "WEB",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"type": "WEB",
"url": "http://tomcat.apache.org/security-7.html"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2011/dsa-2207"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:177"
},
{
"type": "WEB",
"url": "http://www.novell.com/support/viewContent.do?externalId=7007274"
},
{
"type": "WEB",
"url": "http://www.novell.com/support/viewContent.do?externalId=7007275"
},
{
"type": "WEB",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"type": "WEB",
"url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "Apache Tomcat does not properly handle an invalid Transfer-Encoding header"
}
CERTFR-2014-AVI-089
Vulnerability from certfr_avis - Published: 2014-02-25 - Updated: 2014-02-25
De multiples vulnérabilités ont été corrigées dans HP XP P9000 Performance Advisor Software. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
HP XP P9000 Performance Advisor Software versions 5.4.1 et antérieures
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eHP XP P9000 Performance Advisor Software versions 5.4.1 et ant\u00e9rieures\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-5062",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5062"
},
{
"name": "CVE-2011-2729",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2729"
},
{
"name": "CVE-2010-4172",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4172"
},
{
"name": "CVE-2011-3190",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3190"
},
{
"name": "CVE-2011-0534",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0534"
},
{
"name": "CVE-2008-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0002"
},
{
"name": "CVE-2009-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2901"
},
{
"name": "CVE-2011-0013",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0013"
},
{
"name": "CVE-2013-0366",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0366"
},
{
"name": "CVE-2013-0381",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0381"
},
{
"name": "CVE-2009-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
},
{
"name": "CVE-2011-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5063"
},
{
"name": "CVE-2009-2902",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
},
{
"name": "CVE-2012-4431",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4431"
},
{
"name": "CVE-2013-0354",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0354"
},
{
"name": "CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"name": "CVE-2010-2227",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
},
{
"name": "CVE-2008-1232",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1232"
},
{
"name": "CVE-2011-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1184"
},
{
"name": "CVE-2013-0372",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0372"
},
{
"name": "CVE-2011-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2526"
},
{
"name": "CVE-2013-0363",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0363"
},
{
"name": "CVE-2009-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3548"
},
{
"name": "CVE-2008-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2370"
},
{
"name": "CVE-2013-0364",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0364"
},
{
"name": "CVE-2012-3546",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3546"
},
{
"name": "CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"name": "CVE-2012-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3219"
},
{
"name": "CVE-2008-1947",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1947"
},
{
"name": "CVE-2012-4534",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4534"
},
{
"name": "CVE-2013-0352",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0352"
},
{
"name": "CVE-2013-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0397"
},
{
"name": "CVE-2007-6286",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6286"
},
{
"name": "CVE-2013-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0361"
},
{
"name": "CVE-2011-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5064"
},
{
"name": "CVE-2010-3718",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3718"
},
{
"name": "CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"name": "CVE-2012-3190",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3190"
},
{
"name": "CVE-2011-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2481"
},
{
"name": "CVE-2011-5035",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5035"
},
{
"name": "CVE-2011-2204",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2204"
},
{
"name": "CVE-2010-1157",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1157"
},
{
"name": "CVE-2012-2733",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2733"
}
],
"initial_release_date": "2014-02-25T00:00:00",
"last_revision_date": "2014-02-25T00:00:00",
"links": [],
"reference": "CERTFR-2014-AVI-089",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-02-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eHP XP P9000 Performance Advisor Software\u003c/span\u003e.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et un contournement de\nla politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans HP XP P9000 Performance Advisor Software",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 HP c04047415 du 25 f\u00e9vrier 2014",
"url": "http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c04047415-1"
}
]
}
CERTA-2011-AVI-564
Vulnerability from certfr_avis - Published: 2011-10-13 - Updated: 2011-10-13
Plusieurs vulnérabilités présentes dans Mac OS X ont été corrigées.
Description
De multiples vulnérabilités découvertes dans Mac OS X permettent à une personne malveillante d'exécuter du code arbitraire à distance avec potentiellement des privilèges élevés, de provoquer un déni de service, de contourner la politique de sécurité du système, de porter atteinte à la confidentialité et à l'intégrité des données ou encore de réaliser une injection de code indirecte.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X v10.6.8 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Lion Server v10.7 et v10.7.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Server v10.7 et v10.7.1.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Server v10.6.8 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans Mac OS X permettent \u00e0 une\npersonne malveillante d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance avec\npotentiellement des privil\u00e8ges \u00e9lev\u00e9s, de provoquer un d\u00e9ni de service,\nde contourner la politique de s\u00e9curit\u00e9 du syst\u00e8me, de porter atteinte \u00e0\nla confidentialit\u00e9 et \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es ou encore de r\u00e9aliser\nune injection de code indirecte.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-3216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3216"
},
{
"name": "CVE-2011-3436",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3436"
},
{
"name": "CVE-2010-1634",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1634"
},
{
"name": "CVE-2011-3214",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3214"
},
{
"name": "CVE-2011-0187",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0187"
},
{
"name": "CVE-2011-3192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3192"
},
{
"name": "CVE-2011-3228",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3228"
},
{
"name": "CVE-2011-0421",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0421"
},
{
"name": "CVE-2011-0259",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0259"
},
{
"name": "CVE-2011-3221",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3221"
},
{
"name": "CVE-2010-4172",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4172"
},
{
"name": "CVE-2011-3217",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3217"
},
{
"name": "CVE-2011-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3219"
},
{
"name": "CVE-2011-0534",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0534"
},
{
"name": "CVE-2011-0230",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0230"
},
{
"name": "CVE-2011-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0229"
},
{
"name": "CVE-2011-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1471"
},
{
"name": "CVE-2011-3222",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3222"
},
{
"name": "CVE-2011-1466",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1466"
},
{
"name": "CVE-2011-0226",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0226"
},
{
"name": "CVE-2011-0013",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0013"
},
{
"name": "CVE-2011-0231",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0231"
},
{
"name": "CVE-2011-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3213"
},
{
"name": "CVE-2009-4022",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4022"
},
{
"name": "CVE-2011-1153",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1153"
},
{
"name": "CVE-2011-3218",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3218"
},
{
"name": "CVE-2011-2692",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2692"
},
{
"name": "CVE-2010-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4645"
},
{
"name": "CVE-2011-0249",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0249"
},
{
"name": "CVE-2011-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3212"
},
{
"name": "CVE-2011-0250",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0250"
},
{
"name": "CVE-2011-1092",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1092"
},
{
"name": "CVE-2011-3227",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3227"
},
{
"name": "CVE-2011-1469",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1469"
},
{
"name": "CVE-2010-2227",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
},
{
"name": "CVE-2011-1910",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1910"
},
{
"name": "CVE-2011-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3220"
},
{
"name": "CVE-2011-0708",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0708"
},
{
"name": "CVE-2010-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3614"
},
{
"name": "CVE-2011-3224",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3224"
},
{
"name": "CVE-2011-3226",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3226"
},
{
"name": "CVE-2011-0260",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0260"
},
{
"name": "CVE-2011-2690",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2690"
},
{
"name": "CVE-2011-3215",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3215"
},
{
"name": "CVE-2010-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3613"
},
{
"name": "CVE-2011-1521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1521"
},
{
"name": "CVE-2011-1467",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1467"
},
{
"name": "CVE-2011-1755",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1755"
},
{
"name": "CVE-2011-3246",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3246"
},
{
"name": "CVE-2011-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3435"
},
{
"name": "CVE-2011-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2691"
},
{
"name": "CVE-2011-3437",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3437"
},
{
"name": "CVE-2011-0251",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0251"
},
{
"name": "CVE-2011-1470",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1470"
},
{
"name": "CVE-2011-3225",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3225"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2010-3718",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3718"
},
{
"name": "CVE-2011-2464",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2464"
},
{
"name": "CVE-2010-3436",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3436"
},
{
"name": "CVE-2010-0097",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0097"
},
{
"name": "CVE-2011-0707",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0707"
},
{
"name": "CVE-2011-0252",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0252"
},
{
"name": "CVE-2011-0224",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0224"
},
{
"name": "CVE-2010-2089",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2089"
},
{
"name": "CVE-2011-0420",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0420"
},
{
"name": "CVE-2010-1157",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1157"
},
{
"name": "CVE-2011-0419",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0419"
},
{
"name": "CVE-2011-1468",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1468"
},
{
"name": "CVE-2011-3223",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3223"
},
{
"name": "CVE-2011-0185",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0185"
}
],
"initial_release_date": "2011-10-13T00:00:00",
"last_revision_date": "2011-10-13T00:00:00",
"links": [
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-3436 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-3436"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0708 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0708"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1467 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1467"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1910 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1910"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3217 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3217"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1153 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1153"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3220 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3220"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-3614 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-3614"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0420 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0420"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0411 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0411"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0224 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0224"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-3613 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-3613"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3225 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3225"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0249 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0249"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3227 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3227"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1521 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1521"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0185 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0185"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0252 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0252"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0226 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0226"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-4645 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-4645"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3213 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3213"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3221 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3221"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1471 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1471"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3435 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3435"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3218 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3218"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0013 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0013"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-1634 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-1634"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0250 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0250"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3224 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3224"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0259 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0259"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-2690 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-2690"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3226 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3226"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3216 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3216"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3212 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3212"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-2089 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-2089"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-3718 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-3718"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0260 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0260"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3214 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3214"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-1157 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-1157"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0707 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0707"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3223 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3223"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3246 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3246"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-2227 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-2227"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-4172 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-4172"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3436 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3436"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-2691 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-2691"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3437 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3437"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2009-4022 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2009-4022"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0187 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0187"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3192 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3192"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1755 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1755"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-0097 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-0097"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0419 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0419"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1466 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1466"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0421 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0421"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0251 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0251"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3219 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3219"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0229 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0229"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3222 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3222"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0534 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0534"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3228 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3228"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3215 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3215"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1092 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1092"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0230 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0230"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1470 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1470"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0231 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0231"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-2692 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-2692"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1468 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1468"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-2464 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-2464"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1469 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1469"
}
],
"reference": "CERTA-2011-AVI-564",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans Mac OS X ont \u00e9t\u00e9 corrig\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT5002 du 12 octobre 2011",
"url": "http://docs.info.apple.com/article.html?artnum=HT5002"
}
]
}
CERTA-2010-AVI-463
Vulnerability from certfr_avis - Published: 2010-10-01 - Updated: 2010-10-01
Une vulnérabilité dans IBM WebSphere Application Server permet, entre autres, un déni de service à distance, ainsi que l'accès à des données concernant les applications fonctionnant sur le serveur.
Description
IBM WebSphere Application Server utilise un conteneur web Tomcat basé sur la librairie Tomcat catalina. Cette librairie est affectée par une vulnérabilité permettant, à une personne malintentionnée distante, de contourner la politique de sécurité ou d'effectuer un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
IBM WebSphere Application Server Community Edition v2.1.1.4.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eIBM WebSphere Application Server Community Edition v2.1.1.4.\u003c/p\u003e",
"content": "## Description\n\nIBM WebSphere Application Server utilise un conteneur web Tomcat bas\u00e9\nsur la librairie Tomcat catalina. Cette librairie est affect\u00e9e par une\nvuln\u00e9rabilit\u00e9 permettant, \u00e0 une personne malintentionn\u00e9e distante, de\ncontourner la politique de s\u00e9curit\u00e9 ou d\u0027effectuer un d\u00e9ni de service.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-2227",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
}
],
"initial_release_date": "2010-10-01T00:00:00",
"last_revision_date": "2010-10-01T00:00:00",
"links": [],
"reference": "CERTA-2010-AVI-463",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-10-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans IBM WebSphere Application Server permet, entre\nautres, un d\u00e9ni de service \u00e0 distance, ainsi que l\u0027acc\u00e8s \u00e0 des donn\u00e9es\nconcernant les applications fonctionnant sur le serveur.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans IBM WebSphere Application Server Community Edition",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg21448032 du 28 septembre 2010",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21448032"
}
]
}
CERTA-2012-AVI-241
Vulnerability from certfr_avis - Published: 2012-05-02 - Updated: 2012-05-02
De multiples vulnérabilités ont été corrigées dans HP SIM (Systems Insight Manager). Trois systèmes d'exploitation sont concernés, HP-UX, Linux et Windows. Les vulnérabilités sont de différentes natures, exécution de code arbitraire à distance, accès non autorisés, injection de requêtes illégitimes par rebond (CSRF), redirection d'URL, contournement d'authentification et déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "HP-UX.B.11.23 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "HP-UX.B.11.31.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-2134",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2134"
},
{
"name": "CVE-2010-4476",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4476"
},
{
"name": "CVE-2011-2135",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2135"
},
{
"name": "CVE-2011-3558",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3558"
},
{
"name": "CVE-2012-1994",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1994"
},
{
"name": "CVE-2010-4470",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4470"
},
{
"name": "CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"name": "CVE-2012-1999",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1999"
},
{
"name": "CVE-2012-1995",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1995"
},
{
"name": "CVE-2011-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2414"
},
{
"name": "CVE-2011-0864",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0864"
},
{
"name": "CVE-2011-0868",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0868"
},
{
"name": "CVE-2011-2456",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2456"
},
{
"name": "CVE-2011-2450",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2450"
},
{
"name": "CVE-2011-0611",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0611"
},
{
"name": "CVE-2011-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2429"
},
{
"name": "CVE-2011-2430",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2430"
},
{
"name": "CVE-2011-2415",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2415"
},
{
"name": "CVE-2011-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2426"
},
{
"name": "CVE-2011-0866",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0866"
},
{
"name": "CVE-2011-2137",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2137"
},
{
"name": "CVE-2011-2458",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2458"
},
{
"name": "CVE-2011-2140",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2140"
},
{
"name": "CVE-2011-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2425"
},
{
"name": "CVE-2011-2457",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2457"
},
{
"name": "CVE-2011-0871",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0871"
},
{
"name": "CVE-2011-2461",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2461"
},
{
"name": "CVE-2011-0786",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0786"
},
{
"name": "CVE-2009-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
},
{
"name": "CVE-2011-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0802"
},
{
"name": "CVE-2011-2459",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2459"
},
{
"name": "CVE-2010-2227",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
},
{
"name": "CVE-2011-2092",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2092"
},
{
"name": "CVE-2012-1996",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1996"
},
{
"name": "CVE-2011-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2427"
},
{
"name": "CVE-2011-2428",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2428"
},
{
"name": "CVE-2011-0862",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0862"
},
{
"name": "CVE-2011-2139",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2139"
},
{
"name": "CVE-2011-2138",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2138"
},
{
"name": "CVE-2011-2451",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2451"
},
{
"name": "CVE-2011-2136",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2136"
},
{
"name": "CVE-2011-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0865"
},
{
"name": "CVE-2011-2460",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2460"
},
{
"name": "CVE-2011-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2416"
},
{
"name": "CVE-2011-0815",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0815"
},
{
"name": "CVE-2011-0817",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0817"
},
{
"name": "CVE-2011-0863",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0863"
},
{
"name": "CVE-2011-0873",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0873"
},
{
"name": "CVE-2011-0814",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0814"
},
{
"name": "CVE-2011-0788",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0788"
},
{
"name": "CVE-2011-0869",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0869"
},
{
"name": "CVE-2011-2130",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2130"
},
{
"name": "CVE-2012-1997",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1997"
},
{
"name": "CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"name": "CVE-2011-2453",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2453"
},
{
"name": "CVE-2011-0867",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0867"
},
{
"name": "CVE-2011-2093",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2093"
},
{
"name": "CVE-2011-2452",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2452"
},
{
"name": "CVE-2011-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2454"
},
{
"name": "CVE-2011-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2455"
},
{
"name": "CVE-2011-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2417"
},
{
"name": "CVE-2011-2445",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2445"
},
{
"name": "CVE-2011-0872",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0872"
},
{
"name": "CVE-2012-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1998"
},
{
"name": "CVE-2011-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2444"
}
],
"initial_release_date": "2012-05-02T00:00:00",
"last_revision_date": "2012-05-02T00:00:00",
"links": [],
"reference": "CERTA-2012-AVI-241",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-05-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eHP SIM (Systems Insight Manager)\u003c/span\u003e. Trois syst\u00e8mes\nd\u0027exploitation sont concern\u00e9s, HP-UX, Linux et Windows. Les\nvuln\u00e9rabilit\u00e9s sont de diff\u00e9rentes natures, ex\u00e9cution de code arbitraire\n\u00e0 distance, acc\u00e8s non autoris\u00e9s, injection de requ\u00eates ill\u00e9gitimes par\nrebond (CSRF), redirection d\u0027URL, contournement d\u0027authentification et\nd\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans HP SIM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 HP c03298151 du 30 avril 2012",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03298151"
}
]
}
CERTA-2011-AVI-221
Vulnerability from certfr_avis - Published: 2011-04-14 - Updated: 2011-04-14
De multiples vulnérabilités ont été corrigées dans les produits BlackBerry Enterprise Server, avec des impacts variés.
Description
Les produits BlackBerry Enterprise Server contiennent une version vulnérable du serveur Web Apache. Les vulnérabilités peuvent être exploitées par un attaquant pour exécuter du code de manière indirecte, accéder à des données confidentielles et altérer le service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | BlackBerry Enterprise Server versions 4.1.4 à 5.0.2 pour IBM Lotus Domino ; | ||
| Microsoft | N/A | BlackBerry Enterprise Server Express versions 5.0.1 et 5.0.2 MR1 pour Microsoft Exchange ; | ||
| Novell | N/A | BlackBerry Enterprise Server versions 4.1.4 à 5.0.1 pour Novell GroupWise. | ||
| N/A | N/A | BlackBerry Enterprise Server Express version 5.0.2 pour IBM Lotus Domino ; | ||
| Microsoft | N/A | BlackBerry Enterprise Server versions 4.1.4 à 5.0.2 MR1 pour Microsoft Exchange ; |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "BlackBerry Enterprise Server versions 4.1.4 \u00e0 5.0.2 pour IBM Lotus Domino ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BlackBerry Enterprise Server Express versions 5.0.1 et 5.0.2 MR1 pour Microsoft Exchange ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "BlackBerry Enterprise Server versions 4.1.4 \u00e0 5.0.1 pour Novell GroupWise.",
"product": {
"name": "N/A",
"vendor": {
"name": "Novell",
"scada": false
}
}
},
{
"description": "BlackBerry Enterprise Server Express version 5.0.2 pour IBM Lotus Domino ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BlackBerry Enterprise Server versions 4.1.4 \u00e0 5.0.2 MR1 pour Microsoft Exchange ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLes produits BlackBerry Enterprise Server contiennent une version\nvuln\u00e9rable du serveur Web Apache. Les vuln\u00e9rabilit\u00e9s peuvent \u00eatre\nexploit\u00e9es par un attaquant pour ex\u00e9cuter du code de mani\u00e8re indirecte,\nacc\u00e9der \u00e0 des donn\u00e9es confidentielles et alt\u00e9rer le service.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-1678",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1678"
},
{
"name": "CVE-2007-1858",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1858"
},
{
"name": "CVE-2009-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
},
{
"name": "CVE-2010-2227",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
},
{
"name": "CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"name": "CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"name": "CVE-2007-3385",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3385"
}
],
"initial_release_date": "2011-04-14T00:00:00",
"last_revision_date": "2011-04-14T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 BlackBerry KB25966 du 12 avril 2011 :",
"url": "http://www.blackberry.com/btsc/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=KB25966"
}
],
"reference": "CERTA-2011-AVI-221",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-04-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits\nBlackBerry Enterprise Server, avec des impacts vari\u00e9s.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Blackberry Enterprise Server",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 BlackBerry KB25966 du 12 avril 2011",
"url": null
}
]
}
GSD-2010-2227
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2010-2227",
"description": "Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with \"recycling of a buffer.\"",
"id": "GSD-2010-2227",
"references": [
"https://www.suse.com/security/cve/CVE-2010-2227.html",
"https://www.debian.org/security/2011/dsa-2207",
"https://access.redhat.com/errata/RHSA-2010:0693",
"https://access.redhat.com/errata/RHSA-2010:0584",
"https://access.redhat.com/errata/RHSA-2010:0583",
"https://access.redhat.com/errata/RHSA-2010:0582",
"https://access.redhat.com/errata/RHSA-2010:0581",
"https://access.redhat.com/errata/RHSA-2010:0580",
"https://linux.oracle.com/cve/CVE-2010-2227.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2010-2227"
],
"details": "Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with \"recycling of a buffer.\"",
"id": "GSD-2010-2227",
"modified": "2023-12-13T01:21:30.986374Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2227",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with \"recycling of a buffer.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.novell.com/support/viewContent.do?externalId=7007274",
"refsource": "CONFIRM",
"url": "http://www.novell.com/support/viewContent.do?externalId=7007274"
},
{
"name": "20100709 [SECURITY] CVE-2010-2227: Apache Tomcat Remote Denial Of Service and Information Disclosure Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/512272/100/0/threaded"
},
{
"name": "42079",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42079"
},
{
"name": "DSA-2207",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2207"
},
{
"name": "HPSBUX02860",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
},
{
"name": "http://www.novell.com/support/viewContent.do?externalId=7007275",
"refsource": "CONFIRM",
"url": "http://www.novell.com/support/viewContent.do?externalId=7007275"
},
{
"name": "MDVSA-2010:177",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:177"
},
{
"name": "ADV-2010-3056",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3056"
},
{
"name": "43310",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43310"
},
{
"name": "RHSA-2010:0581",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0581.html"
},
{
"name": "41544",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41544"
},
{
"name": "http://tomcat.apache.org/security-7.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-7.html"
},
{
"name": "FEDORA-2010-16270",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050214.html"
},
{
"name": "ADV-2010-1986",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1986"
},
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=959428",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=959428"
},
{
"name": "44183",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44183"
},
{
"name": "RHSA-2010:0580",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0580.html"
},
{
"name": "41025",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41025"
},
{
"name": "FEDORA-2010-16248",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050207.html"
},
{
"name": "http://geronimo.apache.org/22x-security-report.html",
"refsource": "CONFIRM",
"url": "http://geronimo.apache.org/22x-security-report.html"
},
{
"name": "40813",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40813"
},
{
"name": "APPLE-SA-2011-10-12-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "MDVSA-2010:176",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
},
{
"name": "42368",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42368"
},
{
"name": "http://tomcat.apache.org/security-6.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "57126",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57126"
},
{
"name": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
},
{
"name": "oval:org.mitre.oval:def:18532",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18532"
},
{
"name": "1024180",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024180"
},
{
"name": "SUSE-SR:2010:017",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
},
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=958911",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=958911"
},
{
"name": "http://tomcat.apache.org/security-5.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"name": "HPSBUX02579",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2"
},
{
"name": "tomcat-transferencoding-dos(60264)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60264"
},
{
"name": "http://support.apple.com/kb/HT5002",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5002"
},
{
"name": "RHSA-2010:0582",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0582.html"
},
{
"name": "ADV-2010-2868",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2868"
},
{
"name": "SSRT101146",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
},
{
"name": "http://geronimo.apache.org/21x-security-report.html",
"refsource": "CONFIRM",
"url": "http://geronimo.apache.org/21x-security-report.html"
},
{
"name": "42454",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42454"
},
{
"name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"name": "SSRT100203",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2"
},
{
"name": "HPSBST02955",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2"
},
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=958977",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=958977"
},
{
"name": "RHSA-2010:0583",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0583.html"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2227"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with \"recycling of a buffer.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://tomcat.apache.org/security-7.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-7.html"
},
{
"name": "http://tomcat.apache.org/security-5.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-5.html"
},
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=959428",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=959428"
},
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=958977",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=958977"
},
{
"name": "1024180",
"refsource": "SECTRACK",
"tags": [],
"url": "http://securitytracker.com/id?1024180"
},
{
"name": "http://tomcat.apache.org/security-6.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "41544",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/41544"
},
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=958911",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=958911"
},
{
"name": "RHSA-2010:0583",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0583.html"
},
{
"name": "RHSA-2010:0580",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0580.html"
},
{
"name": "40813",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/40813"
},
{
"name": "RHSA-2010:0581",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0581.html"
},
{
"name": "ADV-2010-1986",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2010/1986"
},
{
"name": "RHSA-2010:0582",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0582.html"
},
{
"name": "http://geronimo.apache.org/22x-security-report.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://geronimo.apache.org/22x-security-report.html"
},
{
"name": "http://geronimo.apache.org/21x-security-report.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://geronimo.apache.org/21x-security-report.html"
},
{
"name": "41025",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/41025"
},
{
"name": "MDVSA-2010:176",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
},
{
"name": "MDVSA-2010:177",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:177"
},
{
"name": "SUSE-SR:2010:017",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
},
{
"name": "ADV-2010-2868",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2010/2868"
},
{
"name": "FEDORA-2010-16248",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050207.html"
},
{
"name": "FEDORA-2010-16270",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050214.html"
},
{
"name": "42079",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/42079"
},
{
"name": "HPSBUX02579",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2"
},
{
"name": "ADV-2010-3056",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2010/3056"
},
{
"name": "42368",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/42368"
},
{
"name": "http://www.novell.com/support/viewContent.do?externalId=7007275",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.novell.com/support/viewContent.do?externalId=7007275"
},
{
"name": "http://www.novell.com/support/viewContent.do?externalId=7007274",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.novell.com/support/viewContent.do?externalId=7007274"
},
{
"name": "42454",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/42454"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"name": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
},
{
"name": "43310",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/43310"
},
{
"name": "44183",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/44183"
},
{
"name": "DSA-2207",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2011/dsa-2207"
},
{
"name": "APPLE-SA-2011-10-12-3",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "http://support.apple.com/kb/HT5002",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT5002"
},
{
"name": "HPSBUX02860",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
},
{
"name": "HPSBST02955",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2"
},
{
"name": "57126",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/57126"
},
{
"name": "tomcat-transferencoding-dos(60264)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60264"
},
{
"name": "oval:org.mitre.oval:def:18532",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18532"
},
{
"name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"name": "20100709 [SECURITY] CVE-2010-2227: Apache Tomcat Remote Denial Of Service and Information Disclosure Vulnerability",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/512272/100/0/threaded"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2019-03-25T11:32Z",
"publishedDate": "2010-07-13T17:30Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.