VAR-201105-0121
Vulnerability from variot - Updated: 2026-03-09 21:01Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd. It mainly provides an underlying support interface library for upper-level applications that can be used across multiple operating system platforms. NetBSD is a free and open source Unix-like operating system developed by the NetBSD Foundation. This update fixes this problem (CVE-2011-1928).
For reference, the description of the original DSA, which fixed CVE-2011-0419:
A flaw was found in the APR library, which could be exploited through Apache HTTPD's mod_autoindex. This could be used in a denial of service attack.
For the oldstable distribution (lenny), this problem has been fixed in version 1.2.12-5+lenny4.
For the stable distribution (squeeze), this problem has been fixed in version 1.4.2-6+squeeze2.
For the testing distribution (wheezy), this problem will be fixed in version 1.4.5-1.
For the unstable distribution (sid), this problem will be fixed in version 1.4.5-1.
We recommend that you upgrade your apr packages and restart the apache2 server. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ .
Release Date: 2011-09-08 Last Updated: 2011-09-08
Potential Security Impact: Remote Denial of Service (DoS)
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP-UX Apache Web Server. These vulnerability could be exploited remotely to create a Denial of Service (DoS).
References: CVE-2011-3192, CVE-2011-0419
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.23, B.11.31 running HP-UX Apache Web Server Suite v3.15 or earlier
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2011-3192 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8 CVE-2011-0419 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
This bulletin will be revised when additional information becomes available.
HP has provided the following software update to resolve this vulnerability.
The update is available for download from the following location ftp://srt10606:P2xg=AD5@ftp.usa.hp.com or https://ftp.usa.hp.com/hprc/home with username srt10606 and password P2xg=AD5
HP-UX Web Server Suite v.3.18 containing Apache v2.2.15.08 HP-UX 11i Release Apache Depot name
B.11.23 (32-bit) / Apache-CVE-2011-3192-Fix-IA-PA-32.depot
B.11.23 (64-bit) / Apache-CVE-2011-3192-Fix-IA-PA-64.depot
B.11.31 (32-bit) / Apache-CVE-2011-3192-Fix-IA-PA-32.depot
B.11.31 (64-bit) / Apache-CVE-2011-3192-Fix-IA-PA-64.depot
For customers not wanting to install this preliminary patch, we recommend that three work arounds be considered from the Apache Software Foundation.
1) Use SetEnvIf or mod_rewrite to detect a large number of ranges and then either ignore the Range: header or reject the request.
2) Limit the size of the request field to a few hundred bytes.
3) Use mod_headers to completely disallow the use of Range headers.
Please refer to the Apache advisory for details. http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3c20110826103531.998348F82@minotaur.apache.org%3e
MANUAL ACTIONS: Yes - Update Install HP-UX Web Server Suite v3.18 or subsequent.
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check.
It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant.
AFFECTED VERSIONS
HP-UX Web Server Suite v3.18 HP-UX B.11.23 HP-UX B.11.31 ================== hpuxws22APCH32.APACHE hpuxws22APCH32.APACHE2 hpuxws22APCH32.AUTH_LDAP hpuxws22APCH32.AUTH_LDAP2 hpuxws22APCH32.MOD_JK hpuxws22APCH32.MOD_JK2 hpuxws22APCH32.MOD_PERL hpuxws22APCH32.MOD_PERL2 hpuxws22APCH32.PHP hpuxws22APCH32.PHP2 hpuxws22APCH32.WEBPROXY hpuxws22APCH32.WEBPROXY2 hpuxws22APACHE.APACHE hpuxws22APACHE.APACHE2 hpuxws22APACHE.AUTH_LDAP hpuxws22APACHE.AUTH_LDAP2 hpuxws22APACHE.MOD_JK hpuxws22APACHE.MOD_JK2 hpuxws22APACHE.MOD_PERL hpuxws22APACHE.MOD_PERL2 hpuxws22APACHE.PHP hpuxws22APACHE.PHP2 hpuxws22APACHE.WEBPROXY hpuxws22APACHE.WEBPROXY2 action: install revision B.2.2.15.08 or subsequent
END AFFECTED VERSIONS
HISTORY Version:1 (rev.1) - 8 September 2011 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2011 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. HP System Management Homepage (SMH) before v7.0 running on Linux and Windows. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. ========================================================================== Ubuntu Security Notice USN-1134-1 May 24, 2011
apache2, apr vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS
- Ubuntu 6.06 LTS
Summary:
A denial of service issue exists that affects the Apache web server. (CVE-2011-0419)
Is was discovered that the fix for CVE-2011-0419 introduced a different flaw in the fnmatch() implementation that could also result in a denial of service. (CVE-2011-1928)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 11.04: libapr1 1.4.2-7ubuntu2.1
Ubuntu 10.10: libapr1 1.4.2-3ubuntu1.1
Ubuntu 10.04 LTS: libapr1 1.3.8-1ubuntu0.3
Ubuntu 8.04 LTS: libapr1 1.2.11-1ubuntu0.2
Ubuntu 6.06 LTS: libapr0 2.0.55-4ubuntu2.13
After a standard system update you need to restart the Apache web server or any other service that depends on the APR library to make all the necessary changes. Upgrade to WSS v3.19
B.11.31 (32 & 64-bit) / No longer supported. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: JBoss Enterprise Web Server 1.0.2 update Advisory ID: RHSA-2011:0897-01 Product: JBoss Enterprise Web Server Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0897.html Issue date: 2011-06-22 CVE Names: CVE-2010-1157 CVE-2010-1452 CVE-2010-1623 CVE-2010-3718 CVE-2010-4172 CVE-2011-0013 CVE-2011-0419 =====================================================================
- Summary:
JBoss Enterprise Web Server 1.0.2 is now available for Red Hat Enterprise Linux 4, 5, and 6.
The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
JBoss Enterprise Web Server 1.0 for RHEL 4 AS - i386, noarch, x86_64 JBoss Enterprise Web Server 1.0 for RHEL 4 ES - i386, noarch, x86_64 JBoss Enterprise Web Server 1.0 for RHEL 5 Server - i386, noarch, x86_64 JBoss Enterprise Web Server 1.0 for RHEL 6 Server - i386, noarch, x86_64
- Description:
JBoss Enterprise Web Server is a fully-integrated and certified set of components for hosting Java web applications.
This is the first release of JBoss Enterprise Web Server for Red Hat Enterprise Linux 6. For Red Hat Enterprise Linux 4 and 5, this release serves as a replacement for JBoss Enterprise Web Server 1.0.1, and includes a number of bug fixes. Refer to the Release Notes, linked in the References, for more information.
This update corrects security flaws in the following components:
tomcat6:
A cross-site scripting (XSS) flaw was found in the Manager application, used for managing web applications on Apache Tomcat. If a remote attacker could trick a user who is logged into the Manager application into visiting a specially-crafted URL, the attacker could perform Manager application tasks with the privileges of the logged in user. (CVE-2010-4172)
tomcat5 and tomcat6:
It was found that web applications could modify the location of the Apache Tomcat host's work directory. As web applications deployed on Tomcat have read and write access to this directory, a malicious web application could use this flaw to trick Tomcat into giving it read and write access to an arbitrary directory on the file system. (CVE-2010-3718)
A second cross-site scripting (XSS) flaw was found in the Manager application. A malicious web application could use this flaw to conduct an XSS attack, leading to arbitrary web script execution with the privileges of victims who are logged into and viewing Manager application web pages. (CVE-2011-0013)
A possible minor information leak was found in the way Apache Tomcat generated HTTP BASIC and DIGEST authentication requests. For configurations where a realm name was not specified and Tomcat was accessed via a proxy, the default generated realm contained the hostname and port used by the proxy to send requests to the Tomcat server. (CVE-2010-1157)
httpd:
A flaw was found in the way the mod_dav module of the Apache HTTP Server handled certain requests. If a remote attacker were to send a carefully crafted request to the server, it could cause the httpd child process to crash. (CVE-2010-1452)
apr:
It was found that the apr_fnmatch() function used an unconstrained recursion when processing patterns with the '*' wildcard. An attacker could use this flaw to cause an application using this function, which also accepted untrusted input as a pattern for matching (such as an httpd server using the mod_autoindex module), to exhaust all stack memory or use an excessive amount of CPU time when performing matching. (CVE-2011-0419)
apr-util:
It was found that certain input could cause the apr-util library to allocate more memory than intended in the apr_brigade_split_line() function. An attacker able to provide input in small chunks to an application using the apr-util library (such as httpd) could possibly use this flaw to trigger high memory consumption. Note: This issue only affected the JBoss Enterprise Web Server packages on Red Hat Enterprise Linux 4. (CVE-2010-1623)
All users of JBoss Enterprise Web Server 1.0.1 are advised to upgrade to JBoss Enterprise Web Server 1.0.2, which corrects these issues. After installing this update, the relevant Apache Tomcat service ("tomcat5" or "tomcat6") and the Apache HTTP Server ("httpd") must be restarted for the update to take effect.
- Solution:
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259
- Bugs fixed (http://bugzilla.redhat.com/):
585331 - CVE-2010-1157 tomcat: information disclosure in authentication headers 618189 - CVE-2010-1452 httpd mod_cache, mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments 640281 - CVE-2010-1623 apr-util: high memory consumption in apr_brigade_split_line() 656246 - CVE-2010-4172 tomcat: cross-site-scripting vulnerability in the manager application 675786 - CVE-2011-0013 tomcat: XSS vulnerability in HTML Manager interface 675792 - CVE-2010-3718 tomcat: file permission bypass flaw 677655 - JBEWS 1.0.2 release tracker bug for RHEL 4 677657 - JBEWS 1.0.2 release tracker bug for RHEL-5 677659 - JBEWS 1.0.2 release tracker bug for RHEL-6 703390 - CVE-2011-0419 apr: unconstrained recursion in apr_fnmatch
- Package List:
JBoss Enterprise Web Server 1.0 for RHEL 4 AS:
Source: ant-1.7.1-13.jdk6.ep5.el4.src.rpm antlr-2.7.7-7.ep5.el4.src.rpm bcel-5.2-8.1.ep5.el4.src.rpm cglib-2.2-5.1.1.jdk6.ep5.el4.src.rpm dom4j-1.6.1-11.ep5.el4.src.rpm ecj-3.3.1.1-3.2.2.jdk6.ep5.el4.src.rpm glassfish-jaf-1.1.0-6.1.1.jdk6.ep5.el4.src.rpm glassfish-javamail-1.4.2-0.4.ep5.el4.src.rpm glassfish-jsf-1.2_13-2.2.1.jdk6.ep5.el4.src.rpm hibernate3-3.3.2-1.5.GA_CP04.ep5.el4.src.rpm hibernate3-annotations-3.4.0-3.3.GA_CP04.ep5.el4.src.rpm hibernate3-commons-annotations-3.1.0-1.8.ep5.el4.src.rpm hibernate3-ejb-persistence-3.0-api-1.0.2-3.jdk6.ep5.el4.src.rpm hibernate3-entitymanager-3.4.0-4.3.GA_CP04.ep5.el4.src.rpm httpd22-2.2.17-14.ep5.el4.src.rpm jakarta-commons-beanutils-1.8.0-4.1.1.jdk6.ep5.el4.src.rpm jakarta-commons-chain-1.2-2.2.ep5.el4.src.rpm jakarta-commons-codec-1.3-9.1.1.jdk6.ep5.el4.src.rpm jakarta-commons-collections-3.2.1-4.ep5.el4.src.rpm jakarta-commons-daemon-1.0.5-1.ep5.el4.src.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el4.src.rpm jakarta-commons-dbcp-1.2.1-16.4.ep5.el4.src.rpm jakarta-commons-digester-1.8.1-8.1.jdk6.ep5.el4.src.rpm jakarta-commons-el-1.0-19.2.jdk6.ep5.el4.src.rpm jakarta-commons-fileupload-1.1.1-7.4.ep5.el4.src.rpm jakarta-commons-httpclient-3.1-1.1.1.jdk6.ep5.el4.src.rpm jakarta-commons-io-1.4-1.3.1.jdk6.ep5.el4.src.rpm jakarta-commons-launcher-1.1-4.6.1.ep5.el4.src.rpm jakarta-commons-logging-1.1.1-0.4.1.jdk6.ep5.el4.src.rpm jakarta-commons-logging-jboss-1.1-10.2.1.jdk6.ep5.el4.src.rpm jakarta-commons-modeler-2.0-4.ep5.el4.src.rpm jakarta-commons-pool-1.3-11.2.1.jdk6.ep5.el4.src.rpm jakarta-commons-validator-1.3.1-7.5.1.ep5.el4.src.rpm jakarta-oro-2.0.8-3.3.2.1.jdk6.ep5.el4.src.rpm jakarta-taglibs-standard-1.1.1-9.ep5.el4.src.rpm javassist-3.12.0-1.jdk6.ep5.el4.src.rpm jboss-common-core-2.2.17-1.ep5.el4.src.rpm jboss-common-logging-jdk-2.1.2-1.ep5.el4.src.rpm jboss-common-logging-spi-2.1.2-1.ep5.el4.src.rpm jboss-javaee-5.0.1-2.9.ep5.el4.src.rpm jcommon-1.0.16-1.2.1.jdk6.ep5.el4.src.rpm jfreechart-1.0.13-2.3.2.1.jdk6.ep5.el4.src.rpm log4j-1.2.14-18.1.jdk6.ep5.el4.src.rpm mod_cluster-1.0.10-2.GA_CP01.ep5.el4.src.rpm mod_cluster-native-1.0.10-2.GA_CP01.ep5.el4.src.rpm mod_jk-1.2.31-1.ep5.el4.src.rpm mx4j-3.0.1-9.3.4.ep5.el4.src.rpm objectweb-asm-3.1-5.3.1.jdk6.ep5.el4.src.rpm regexp-1.5-1.2.1.jdk6.ep5.el4.src.rpm struts12-1.2.9-3.ep5.el4.src.rpm tomcat-jkstatus-ant-1.2.31-2.ep5.el4.src.rpm tomcat-native-1.1.20-2.0.ep5.el4.src.rpm tomcat5-5.5.33-14_patch_04.ep5.el4.src.rpm tomcat6-6.0.32-15_patch_03.ep5.el4.src.rpm xalan-j2-2.7.1-5.3_patch_04.ep5.el4.src.rpm xerces-j2-2.9.1-3.patch01.1.ep5.el4.src.rpm xml-commons-1.3.04-7.12.ep5.el4.src.rpm
i386: httpd22-2.2.17-14.ep5.el4.i386.rpm httpd22-apr-2.2.17-14.ep5.el4.i386.rpm httpd22-apr-devel-2.2.17-14.ep5.el4.i386.rpm httpd22-apr-util-2.2.17-14.ep5.el4.i386.rpm httpd22-apr-util-devel-2.2.17-14.ep5.el4.i386.rpm httpd22-debuginfo-2.2.17-14.ep5.el4.i386.rpm httpd22-devel-2.2.17-14.ep5.el4.i386.rpm httpd22-manual-2.2.17-14.ep5.el4.i386.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el4.i386.rpm jakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el4.i386.rpm mod_cluster-native-1.0.10-2.GA_CP01.ep5.el4.i386.rpm mod_cluster-native-debuginfo-1.0.10-2.GA_CP01.ep5.el4.i386.rpm mod_jk-ap20-1.2.31-1.ep5.el4.i386.rpm mod_jk-debuginfo-1.2.31-1.ep5.el4.i386.rpm mod_jk-manual-1.2.31-1.ep5.el4.i386.rpm mod_ssl22-2.2.17-14.ep5.el4.i386.rpm tomcat-native-1.1.20-2.0.ep5.el4.i386.rpm tomcat-native-debuginfo-1.1.20-2.0.ep5.el4.i386.rpm
noarch: ant-1.7.1-13.jdk6.ep5.el4.noarch.rpm antlr-2.7.7-7.ep5.el4.noarch.rpm bcel-5.2-8.1.ep5.el4.noarch.rpm cglib-2.2-5.1.1.jdk6.ep5.el4.noarch.rpm dom4j-1.6.1-11.ep5.el4.noarch.rpm ecj-3.3.1.1-3.2.2.jdk6.ep5.el4.noarch.rpm glassfish-jaf-1.1.0-6.1.1.jdk6.ep5.el4.noarch.rpm glassfish-javamail-1.4.2-0.4.ep5.el4.noarch.rpm glassfish-jsf-1.2_13-2.2.1.jdk6.ep5.el4.noarch.rpm hibernate3-3.3.2-1.5.GA_CP04.ep5.el4.noarch.rpm hibernate3-annotations-3.4.0-3.3.GA_CP04.ep5.el4.noarch.rpm hibernate3-annotations-javadoc-3.4.0-3.3.GA_CP04.ep5.el4.noarch.rpm hibernate3-commons-annotations-3.1.0-1.8.ep5.el4.noarch.rpm hibernate3-commons-annotations-javadoc-3.1.0-1.8.ep5.el4.noarch.rpm hibernate3-ejb-persistence-3.0-api-1.0.2-3.jdk6.ep5.el4.noarch.rpm hibernate3-ejb-persistence-3.0-api-javadoc-1.0.2-3.jdk6.ep5.el4.noarch.rpm hibernate3-entitymanager-3.4.0-4.3.GA_CP04.ep5.el4.noarch.rpm hibernate3-entitymanager-javadoc-3.4.0-4.3.GA_CP04.ep5.el4.noarch.rpm hibernate3-javadoc-3.3.2-1.5.GA_CP04.ep5.el4.noarch.rpm jakarta-commons-beanutils-1.8.0-4.1.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-chain-1.2-2.2.ep5.el4.noarch.rpm jakarta-commons-codec-1.3-9.1.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-collections-3.2.1-4.ep5.el4.noarch.rpm jakarta-commons-collections-tomcat5-3.2.1-4.ep5.el4.noarch.rpm jakarta-commons-daemon-1.0.5-1.ep5.el4.noarch.rpm jakarta-commons-dbcp-1.2.1-16.4.ep5.el4.noarch.rpm jakarta-commons-dbcp-tomcat5-1.2.1-16.4.ep5.el4.noarch.rpm jakarta-commons-digester-1.8.1-8.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-el-1.0-19.2.jdk6.ep5.el4.noarch.rpm jakarta-commons-fileupload-1.1.1-7.4.ep5.el4.noarch.rpm jakarta-commons-httpclient-3.1-1.1.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-io-1.4-1.3.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-launcher-1.1-4.6.1.ep5.el4.noarch.rpm jakarta-commons-logging-1.1.1-0.4.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-logging-jboss-1.1-10.2.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-logging-tomcat6-1.1.1-0.4.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-modeler-2.0-4.ep5.el4.noarch.rpm jakarta-commons-pool-1.3-11.2.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-pool-tomcat5-1.3-11.2.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-validator-1.3.1-7.5.1.ep5.el4.noarch.rpm jakarta-oro-2.0.8-3.3.2.1.jdk6.ep5.el4.noarch.rpm jakarta-taglibs-standard-1.1.1-9.ep5.el4.noarch.rpm javassist-3.12.0-1.jdk6.ep5.el4.noarch.rpm jboss-common-core-2.2.17-1.ep5.el4.noarch.rpm jboss-common-logging-jdk-2.1.2-1.ep5.el4.noarch.rpm jboss-common-logging-spi-2.1.2-1.ep5.el4.noarch.rpm jboss-javaee-poms-5.0.1-2.9.ep5.el4.noarch.rpm jboss-jms-1.1-api-5.0.1-2.9.ep5.el4.noarch.rpm jboss-transaction-1.0.1-api-5.0.1-2.9.ep5.el4.noarch.rpm jcommon-1.0.16-1.2.1.jdk6.ep5.el4.noarch.rpm jfreechart-1.0.13-2.3.2.1.jdk6.ep5.el4.noarch.rpm log4j-1.2.14-18.1.jdk6.ep5.el4.noarch.rpm mod_cluster-demo-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm mod_cluster-jbossas-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm mod_cluster-jbossweb2-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm mod_cluster-tomcat6-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm mx4j-3.0.1-9.3.4.ep5.el4.noarch.rpm objectweb-asm-3.1-5.3.1.jdk6.ep5.el4.noarch.rpm regexp-1.5-1.2.1.jdk6.ep5.el4.noarch.rpm struts12-1.2.9-3.ep5.el4.noarch.rpm tomcat-jkstatus-ant-1.2.31-2.ep5.el4.noarch.rpm tomcat5-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-admin-webapps-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-common-lib-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-jasper-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-jasper-eclipse-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-jasper-javadoc-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-jsp-2.0-api-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-jsp-2.0-api-javadoc-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-parent-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-server-lib-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-servlet-2.4-api-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-servlet-2.4-api-javadoc-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-webapps-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat6-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-admin-webapps-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-docs-webapp-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-el-1.0-api-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-javadoc-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-jsp-2.1-api-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-lib-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-log4j-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-servlet-2.5-api-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-webapps-6.0.32-15_patch_03.ep5.el4.noarch.rpm xalan-j2-2.7.1-5.3_patch_04.ep5.el4.noarch.rpm xerces-j2-2.9.1-3.patch01.1.ep5.el4.noarch.rpm xml-commons-1.3.04-7.12.ep5.el4.noarch.rpm xml-commons-jaxp-1.2-apis-1.3.04-7.12.ep5.el4.noarch.rpm xml-commons-jaxp-1.3-apis-1.3.04-7.12.ep5.el4.noarch.rpm xml-commons-resolver12-1.3.04-7.12.ep5.el4.noarch.rpm
x86_64: httpd22-2.2.17-14.ep5.el4.x86_64.rpm httpd22-apr-2.2.17-14.ep5.el4.x86_64.rpm httpd22-apr-devel-2.2.17-14.ep5.el4.x86_64.rpm httpd22-apr-util-2.2.17-14.ep5.el4.x86_64.rpm httpd22-apr-util-devel-2.2.17-14.ep5.el4.x86_64.rpm httpd22-debuginfo-2.2.17-14.ep5.el4.x86_64.rpm httpd22-devel-2.2.17-14.ep5.el4.x86_64.rpm httpd22-manual-2.2.17-14.ep5.el4.x86_64.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el4.x86_64.rpm jakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el4.x86_64.rpm mod_cluster-native-1.0.10-2.GA_CP01.ep5.el4.x86_64.rpm mod_cluster-native-debuginfo-1.0.10-2.GA_CP01.ep5.el4.x86_64.rpm mod_jk-ap20-1.2.31-1.ep5.el4.x86_64.rpm mod_jk-debuginfo-1.2.31-1.ep5.el4.x86_64.rpm mod_jk-manual-1.2.31-1.ep5.el4.x86_64.rpm mod_ssl22-2.2.17-14.ep5.el4.x86_64.rpm tomcat-native-1.1.20-2.0.ep5.el4.x86_64.rpm tomcat-native-debuginfo-1.1.20-2.0.ep5.el4.x86_64.rpm
JBoss Enterprise Web Server 1.0 for RHEL 4 ES:
Source: ant-1.7.1-13.jdk6.ep5.el4.src.rpm antlr-2.7.7-7.ep5.el4.src.rpm bcel-5.2-8.1.ep5.el4.src.rpm cglib-2.2-5.1.1.jdk6.ep5.el4.src.rpm dom4j-1.6.1-11.ep5.el4.src.rpm ecj-3.3.1.1-3.2.2.jdk6.ep5.el4.src.rpm glassfish-jaf-1.1.0-6.1.1.jdk6.ep5.el4.src.rpm glassfish-javamail-1.4.2-0.4.ep5.el4.src.rpm glassfish-jsf-1.2_13-2.2.1.jdk6.ep5.el4.src.rpm hibernate3-3.3.2-1.5.GA_CP04.ep5.el4.src.rpm hibernate3-annotations-3.4.0-3.3.GA_CP04.ep5.el4.src.rpm hibernate3-commons-annotations-3.1.0-1.8.ep5.el4.src.rpm hibernate3-ejb-persistence-3.0-api-1.0.2-3.jdk6.ep5.el4.src.rpm hibernate3-entitymanager-3.4.0-4.3.GA_CP04.ep5.el4.src.rpm httpd22-2.2.17-14.ep5.el4.src.rpm jakarta-commons-beanutils-1.8.0-4.1.1.jdk6.ep5.el4.src.rpm jakarta-commons-chain-1.2-2.2.ep5.el4.src.rpm jakarta-commons-codec-1.3-9.1.1.jdk6.ep5.el4.src.rpm jakarta-commons-collections-3.2.1-4.ep5.el4.src.rpm jakarta-commons-daemon-1.0.5-1.ep5.el4.src.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el4.src.rpm jakarta-commons-dbcp-1.2.1-16.4.ep5.el4.src.rpm jakarta-commons-digester-1.8.1-8.1.jdk6.ep5.el4.src.rpm jakarta-commons-el-1.0-19.2.jdk6.ep5.el4.src.rpm jakarta-commons-fileupload-1.1.1-7.4.ep5.el4.src.rpm jakarta-commons-httpclient-3.1-1.1.1.jdk6.ep5.el4.src.rpm jakarta-commons-io-1.4-1.3.1.jdk6.ep5.el4.src.rpm jakarta-commons-launcher-1.1-4.6.1.ep5.el4.src.rpm jakarta-commons-logging-1.1.1-0.4.1.jdk6.ep5.el4.src.rpm jakarta-commons-logging-jboss-1.1-10.2.1.jdk6.ep5.el4.src.rpm jakarta-commons-modeler-2.0-4.ep5.el4.src.rpm jakarta-commons-pool-1.3-11.2.1.jdk6.ep5.el4.src.rpm jakarta-commons-validator-1.3.1-7.5.1.ep5.el4.src.rpm jakarta-oro-2.0.8-3.3.2.1.jdk6.ep5.el4.src.rpm jakarta-taglibs-standard-1.1.1-9.ep5.el4.src.rpm javassist-3.12.0-1.jdk6.ep5.el4.src.rpm jboss-common-core-2.2.17-1.ep5.el4.src.rpm jboss-common-logging-jdk-2.1.2-1.ep5.el4.src.rpm jboss-common-logging-spi-2.1.2-1.ep5.el4.src.rpm jboss-javaee-5.0.1-2.9.ep5.el4.src.rpm jcommon-1.0.16-1.2.1.jdk6.ep5.el4.src.rpm jfreechart-1.0.13-2.3.2.1.jdk6.ep5.el4.src.rpm log4j-1.2.14-18.1.jdk6.ep5.el4.src.rpm mod_cluster-1.0.10-2.GA_CP01.ep5.el4.src.rpm mod_cluster-native-1.0.10-2.GA_CP01.ep5.el4.src.rpm mod_jk-1.2.31-1.ep5.el4.src.rpm mx4j-3.0.1-9.3.4.ep5.el4.src.rpm objectweb-asm-3.1-5.3.1.jdk6.ep5.el4.src.rpm regexp-1.5-1.2.1.jdk6.ep5.el4.src.rpm struts12-1.2.9-3.ep5.el4.src.rpm tomcat-jkstatus-ant-1.2.31-2.ep5.el4.src.rpm tomcat-native-1.1.20-2.0.ep5.el4.src.rpm tomcat5-5.5.33-14_patch_04.ep5.el4.src.rpm tomcat6-6.0.32-15_patch_03.ep5.el4.src.rpm xalan-j2-2.7.1-5.3_patch_04.ep5.el4.src.rpm xerces-j2-2.9.1-3.patch01.1.ep5.el4.src.rpm xml-commons-1.3.04-7.12.ep5.el4.src.rpm
i386: httpd22-2.2.17-14.ep5.el4.i386.rpm httpd22-apr-2.2.17-14.ep5.el4.i386.rpm httpd22-apr-devel-2.2.17-14.ep5.el4.i386.rpm httpd22-apr-util-2.2.17-14.ep5.el4.i386.rpm httpd22-apr-util-devel-2.2.17-14.ep5.el4.i386.rpm httpd22-debuginfo-2.2.17-14.ep5.el4.i386.rpm httpd22-devel-2.2.17-14.ep5.el4.i386.rpm httpd22-manual-2.2.17-14.ep5.el4.i386.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el4.i386.rpm jakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el4.i386.rpm mod_cluster-native-1.0.10-2.GA_CP01.ep5.el4.i386.rpm mod_cluster-native-debuginfo-1.0.10-2.GA_CP01.ep5.el4.i386.rpm mod_jk-ap20-1.2.31-1.ep5.el4.i386.rpm mod_jk-debuginfo-1.2.31-1.ep5.el4.i386.rpm mod_jk-manual-1.2.31-1.ep5.el4.i386.rpm mod_ssl22-2.2.17-14.ep5.el4.i386.rpm tomcat-native-1.1.20-2.0.ep5.el4.i386.rpm tomcat-native-debuginfo-1.1.20-2.0.ep5.el4.i386.rpm
noarch: ant-1.7.1-13.jdk6.ep5.el4.noarch.rpm antlr-2.7.7-7.ep5.el4.noarch.rpm bcel-5.2-8.1.ep5.el4.noarch.rpm cglib-2.2-5.1.1.jdk6.ep5.el4.noarch.rpm dom4j-1.6.1-11.ep5.el4.noarch.rpm ecj-3.3.1.1-3.2.2.jdk6.ep5.el4.noarch.rpm glassfish-jaf-1.1.0-6.1.1.jdk6.ep5.el4.noarch.rpm glassfish-javamail-1.4.2-0.4.ep5.el4.noarch.rpm glassfish-jsf-1.2_13-2.2.1.jdk6.ep5.el4.noarch.rpm hibernate3-3.3.2-1.5.GA_CP04.ep5.el4.noarch.rpm hibernate3-annotations-3.4.0-3.3.GA_CP04.ep5.el4.noarch.rpm hibernate3-annotations-javadoc-3.4.0-3.3.GA_CP04.ep5.el4.noarch.rpm hibernate3-commons-annotations-3.1.0-1.8.ep5.el4.noarch.rpm hibernate3-commons-annotations-javadoc-3.1.0-1.8.ep5.el4.noarch.rpm hibernate3-ejb-persistence-3.0-api-1.0.2-3.jdk6.ep5.el4.noarch.rpm hibernate3-ejb-persistence-3.0-api-javadoc-1.0.2-3.jdk6.ep5.el4.noarch.rpm hibernate3-entitymanager-3.4.0-4.3.GA_CP04.ep5.el4.noarch.rpm hibernate3-entitymanager-javadoc-3.4.0-4.3.GA_CP04.ep5.el4.noarch.rpm hibernate3-javadoc-3.3.2-1.5.GA_CP04.ep5.el4.noarch.rpm jakarta-commons-beanutils-1.8.0-4.1.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-chain-1.2-2.2.ep5.el4.noarch.rpm jakarta-commons-codec-1.3-9.1.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-collections-3.2.1-4.ep5.el4.noarch.rpm jakarta-commons-collections-tomcat5-3.2.1-4.ep5.el4.noarch.rpm jakarta-commons-daemon-1.0.5-1.ep5.el4.noarch.rpm jakarta-commons-dbcp-1.2.1-16.4.ep5.el4.noarch.rpm jakarta-commons-dbcp-tomcat5-1.2.1-16.4.ep5.el4.noarch.rpm jakarta-commons-digester-1.8.1-8.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-el-1.0-19.2.jdk6.ep5.el4.noarch.rpm jakarta-commons-fileupload-1.1.1-7.4.ep5.el4.noarch.rpm jakarta-commons-httpclient-3.1-1.1.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-io-1.4-1.3.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-launcher-1.1-4.6.1.ep5.el4.noarch.rpm jakarta-commons-logging-1.1.1-0.4.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-logging-jboss-1.1-10.2.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-logging-tomcat6-1.1.1-0.4.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-modeler-2.0-4.ep5.el4.noarch.rpm jakarta-commons-pool-1.3-11.2.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-pool-tomcat5-1.3-11.2.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-validator-1.3.1-7.5.1.ep5.el4.noarch.rpm jakarta-oro-2.0.8-3.3.2.1.jdk6.ep5.el4.noarch.rpm jakarta-taglibs-standard-1.1.1-9.ep5.el4.noarch.rpm javassist-3.12.0-1.jdk6.ep5.el4.noarch.rpm jboss-common-core-2.2.17-1.ep5.el4.noarch.rpm jboss-common-logging-jdk-2.1.2-1.ep5.el4.noarch.rpm jboss-common-logging-spi-2.1.2-1.ep5.el4.noarch.rpm jboss-javaee-poms-5.0.1-2.9.ep5.el4.noarch.rpm jboss-jms-1.1-api-5.0.1-2.9.ep5.el4.noarch.rpm jboss-transaction-1.0.1-api-5.0.1-2.9.ep5.el4.noarch.rpm jcommon-1.0.16-1.2.1.jdk6.ep5.el4.noarch.rpm jfreechart-1.0.13-2.3.2.1.jdk6.ep5.el4.noarch.rpm log4j-1.2.14-18.1.jdk6.ep5.el4.noarch.rpm mod_cluster-demo-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm mod_cluster-jbossas-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm mod_cluster-jbossweb2-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm mod_cluster-tomcat6-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm mx4j-3.0.1-9.3.4.ep5.el4.noarch.rpm objectweb-asm-3.1-5.3.1.jdk6.ep5.el4.noarch.rpm regexp-1.5-1.2.1.jdk6.ep5.el4.noarch.rpm struts12-1.2.9-3.ep5.el4.noarch.rpm tomcat-jkstatus-ant-1.2.31-2.ep5.el4.noarch.rpm tomcat5-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-admin-webapps-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-common-lib-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-jasper-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-jasper-eclipse-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-jasper-javadoc-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-jsp-2.0-api-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-jsp-2.0-api-javadoc-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-parent-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-server-lib-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-servlet-2.4-api-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-servlet-2.4-api-javadoc-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-webapps-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat6-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-admin-webapps-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-docs-webapp-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-el-1.0-api-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-javadoc-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-jsp-2.1-api-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-lib-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-log4j-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-servlet-2.5-api-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-webapps-6.0.32-15_patch_03.ep5.el4.noarch.rpm xalan-j2-2.7.1-5.3_patch_04.ep5.el4.noarch.rpm xerces-j2-2.9.1-3.patch01.1.ep5.el4.noarch.rpm xml-commons-1.3.04-7.12.ep5.el4.noarch.rpm xml-commons-jaxp-1.2-apis-1.3.04-7.12.ep5.el4.noarch.rpm xml-commons-jaxp-1.3-apis-1.3.04-7.12.ep5.el4.noarch.rpm xml-commons-resolver12-1.3.04-7.12.ep5.el4.noarch.rpm
x86_64: httpd22-2.2.17-14.ep5.el4.x86_64.rpm httpd22-apr-2.2.17-14.ep5.el4.x86_64.rpm httpd22-apr-devel-2.2.17-14.ep5.el4.x86_64.rpm httpd22-apr-util-2.2.17-14.ep5.el4.x86_64.rpm httpd22-apr-util-devel-2.2.17-14.ep5.el4.x86_64.rpm httpd22-debuginfo-2.2.17-14.ep5.el4.x86_64.rpm httpd22-devel-2.2.17-14.ep5.el4.x86_64.rpm httpd22-manual-2.2.17-14.ep5.el4.x86_64.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el4.x86_64.rpm jakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el4.x86_64.rpm mod_cluster-native-1.0.10-2.GA_CP01.ep5.el4.x86_64.rpm mod_cluster-native-debuginfo-1.0.10-2.GA_CP01.ep5.el4.x86_64.rpm mod_jk-ap20-1.2.31-1.ep5.el4.x86_64.rpm mod_jk-debuginfo-1.2.31-1.ep5.el4.x86_64.rpm mod_jk-manual-1.2.31-1.ep5.el4.x86_64.rpm mod_ssl22-2.2.17-14.ep5.el4.x86_64.rpm tomcat-native-1.1.20-2.0.ep5.el4.x86_64.rpm tomcat-native-debuginfo-1.1.20-2.0.ep5.el4.x86_64.rpm
JBoss Enterprise Web Server 1.0 for RHEL 5 Server:
Source: ant-1.7.1-13.jdk6.ep5.el5.src.rpm antlr-2.7.7-7.ep5.el5.src.rpm cglib-2.2-5.1.1.1.jdk6.ep5.el5.src.rpm dom4j-1.6.1-11.ep5.el5.src.rpm ecj3-3.3.1.1-3.1.1.1.jdk6.ep5.el5.src.rpm glassfish-jsf-1.2_13-3.1.1.jdk6.ep5.el5.src.rpm hibernate3-3.3.2-1.4.GA_CP04.ep5.el5.src.rpm hibernate3-annotations-3.4.0-3.2.GA_CP04.ep5.el5.src.rpm hibernate3-commons-annotations-3.1.0-1.8.ep5.el5.src.rpm hibernate3-ejb-persistence-3.0-api-1.0.2-3.1.jdk6.ep5.el5.src.rpm hibernate3-entitymanager-3.4.0-4.3.GA_CP04.ep5.el5.src.rpm httpd-2.2.17-11.1.ep5.el5.src.rpm jakarta-commons-beanutils-1.8.0-4.1.2.1.jdk6.ep5.el5.src.rpm jakarta-commons-chain-1.2-2.2.1.ep5.el5.src.rpm jakarta-commons-codec-1.3-9.2.1.1.jdk6.ep5.el5.src.rpm jakarta-commons-collections-3.2.1-4.1.ep5.el5.src.rpm jakarta-commons-daemon-1.0.5-1.ep5.el5.src.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el5.src.rpm jakarta-commons-dbcp-1.2.1-16.4.ep5.el5.src.rpm jakarta-commons-digester-1.8.1-8.1.jdk6.ep5.el5.src.rpm jakarta-commons-fileupload-1.1.1-7.4.ep5.el5.src.rpm jakarta-commons-httpclient-3.1-1.2.1.jdk6.ep5.el5.src.rpm jakarta-commons-io-1.4-1.3.1.jdk6.ep5.el5.src.rpm jakarta-commons-logging-1.1.1-0.4.1.jdk6.ep5.el5.src.rpm jakarta-commons-logging-jboss-1.1-10.2.1.jdk6.ep5.el5.src.rpm jakarta-commons-pool-1.3-11.2.1.jdk6.ep5.el5.src.rpm jakarta-commons-validator-1.3.1-7.5.2.ep5.el5.src.rpm jakarta-oro-2.0.8-3.3.2.1.1.1.jdk6.ep5.el5.src.rpm jakarta-taglibs-standard-1.1.1-9.1.ep5.el5.src.rpm javassist-3.12.0-1.jdk6.ep5.el5.src.rpm jboss-common-core-2.2.17-1.ep5.el5.src.rpm jboss-common-logging-jdk-2.1.2-1.ep5.el5.src.rpm jboss-common-logging-spi-2.1.2-1.ep5.el5.src.rpm jboss-javaee-5.0.1-2.9.ep5.el5.src.rpm jcommon-1.0.16-1.2.1.jdk6.ep5.el5.src.rpm jfreechart-1.0.13-2.3.2.1.jdk6.ep5.el5.src.rpm mod_cluster-1.0.10-2.1.GA_CP01.ep5.el5.src.rpm mod_cluster-native-1.0.10-2.1.GA_CP01.ep5.el5.src.rpm mod_jk-1.2.31-1.1.ep5.el5.src.rpm objectweb-asm-3.1-5.3.1.jdk6.ep5.el5.src.rpm struts12-1.2.9-3.1.ep5.el5.src.rpm tomcat-jkstatus-ant-1.2.31-2.ep5.el5.src.rpm tomcat-native-1.1.20-2.1.ep5.el5.src.rpm tomcat5-5.5.33-16_patch_04.ep5.el5.src.rpm tomcat6-6.0.32-15.1_patch_03.ep5.el5.src.rpm xalan-j2-2.7.1-5.3_patch_04.ep5.el5.src.rpm xerces-j2-2.9.1-3.patch01.1.ep5.el5.src.rpm xml-commons-1.3.04-7.10.jdk6.ep5.el5.src.rpm
i386: httpd-2.2.17-11.1.ep5.el5.i386.rpm httpd-debuginfo-2.2.17-11.1.ep5.el5.i386.rpm httpd-devel-2.2.17-11.1.ep5.el5.i386.rpm httpd-manual-2.2.17-11.1.ep5.el5.i386.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el5.i386.rpm jakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el5.i386.rpm mod_cluster-native-1.0.10-2.1.GA_CP01.ep5.el5.i386.rpm mod_cluster-native-debuginfo-1.0.10-2.1.GA_CP01.ep5.el5.i386.rpm mod_jk-ap20-1.2.31-1.1.ep5.el5.i386.rpm mod_jk-debuginfo-1.2.31-1.1.ep5.el5.i386.rpm mod_jk-manual-1.2.31-1.1.ep5.el5.i386.rpm mod_ssl-2.2.17-11.1.ep5.el5.i386.rpm tomcat-native-1.1.20-2.1.ep5.el5.i386.rpm tomcat-native-debuginfo-1.1.20-2.1.ep5.el5.i386.rpm
noarch: ant-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-antlr-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-apache-bcel-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-apache-bsf-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-apache-log4j-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-apache-oro-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-apache-regexp-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-apache-resolver-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-commons-logging-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-javamail-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-jdepend-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-jmf-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-jsch-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-junit-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-nodeps-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-scripts-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-swing-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-trax-1.7.1-13.jdk6.ep5.el5.noarch.rpm antlr-2.7.7-7.ep5.el5.noarch.rpm cglib-2.2-5.1.1.1.jdk6.ep5.el5.noarch.rpm dom4j-1.6.1-11.ep5.el5.noarch.rpm ecj3-3.3.1.1-3.1.1.1.jdk6.ep5.el5.noarch.rpm glassfish-jsf-1.2_13-3.1.1.jdk6.ep5.el5.noarch.rpm hibernate3-3.3.2-1.4.GA_CP04.ep5.el5.noarch.rpm hibernate3-annotations-3.4.0-3.2.GA_CP04.ep5.el5.noarch.rpm hibernate3-annotations-javadoc-3.4.0-3.2.GA_CP04.ep5.el5.noarch.rpm hibernate3-commons-annotations-3.1.0-1.8.ep5.el5.noarch.rpm hibernate3-commons-annotations-javadoc-3.1.0-1.8.ep5.el5.noarch.rpm hibernate3-ejb-persistence-3.0-api-1.0.2-3.1.jdk6.ep5.el5.noarch.rpm hibernate3-ejb-persistence-3.0-api-javadoc-1.0.2-3.1.jdk6.ep5.el5.noarch.rpm hibernate3-entitymanager-3.4.0-4.3.GA_CP04.ep5.el5.noarch.rpm hibernate3-entitymanager-javadoc-3.4.0-4.3.GA_CP04.ep5.el5.noarch.rpm hibernate3-javadoc-3.3.2-1.4.GA_CP04.ep5.el5.noarch.rpm jakarta-commons-beanutils-1.8.0-4.1.2.1.jdk6.ep5.el5.noarch.rpm jakarta-commons-chain-1.2-2.2.1.ep5.el5.noarch.rpm jakarta-commons-codec-1.3-9.2.1.1.jdk6.ep5.el5.noarch.rpm jakarta-commons-collections-3.2.1-4.1.ep5.el5.noarch.rpm jakarta-commons-collections-tomcat5-3.2.1-4.1.ep5.el5.noarch.rpm jakarta-commons-daemon-1.0.5-1.ep5.el5.noarch.rpm jakarta-commons-dbcp-1.2.1-16.4.ep5.el5.noarch.rpm jakarta-commons-dbcp-tomcat5-1.2.1-16.4.ep5.el5.noarch.rpm jakarta-commons-digester-1.8.1-8.1.jdk6.ep5.el5.noarch.rpm jakarta-commons-fileupload-1.1.1-7.4.ep5.el5.noarch.rpm jakarta-commons-httpclient-3.1-1.2.1.jdk6.ep5.el5.noarch.rpm jakarta-commons-io-1.4-1.3.1.jdk6.ep5.el5.noarch.rpm jakarta-commons-logging-1.1.1-0.4.1.jdk6.ep5.el5.noarch.rpm jakarta-commons-logging-jboss-1.1-10.2.1.jdk6.ep5.el5.noarch.rpm jakarta-commons-logging-tomcat6-1.1.1-0.4.1.jdk6.ep5.el5.noarch.rpm jakarta-commons-pool-1.3-11.2.1.jdk6.ep5.el5.noarch.rpm jakarta-commons-pool-tomcat5-1.3-11.2.1.jdk6.ep5.el5.noarch.rpm jakarta-commons-validator-1.3.1-7.5.2.ep5.el5.noarch.rpm jakarta-oro-2.0.8-3.3.2.1.1.1.jdk6.ep5.el5.noarch.rpm jakarta-taglibs-standard-1.1.1-9.1.ep5.el5.noarch.rpm javassist-3.12.0-1.jdk6.ep5.el5.noarch.rpm jboss-common-core-2.2.17-1.ep5.el5.noarch.rpm jboss-common-logging-jdk-2.1.2-1.ep5.el5.noarch.rpm jboss-common-logging-spi-2.1.2-1.ep5.el5.noarch.rpm jboss-javaee-5.0.1-2.9.ep5.el5.noarch.rpm jboss-javaee-poms-5.0.1-2.9.ep5.el5.noarch.rpm jboss-jms-1.1-api-5.0.1-2.9.ep5.el5.noarch.rpm jboss-transaction-1.0.1-api-5.0.1-2.9.ep5.el5.noarch.rpm jcommon-1.0.16-1.2.1.jdk6.ep5.el5.noarch.rpm jfreechart-1.0.13-2.3.2.1.jdk6.ep5.el5.noarch.rpm mod_cluster-demo-1.0.10-2.1.GA_CP01.ep5.el5.noarch.rpm mod_cluster-jbossas-1.0.10-2.1.GA_CP01.ep5.el5.noarch.rpm mod_cluster-jbossweb2-1.0.10-2.1.GA_CP01.ep5.el5.noarch.rpm mod_cluster-tomcat6-1.0.10-2.1.GA_CP01.ep5.el5.noarch.rpm objectweb-asm-3.1-5.3.1.jdk6.ep5.el5.noarch.rpm struts12-1.2.9-3.1.ep5.el5.noarch.rpm tomcat-jkstatus-ant-1.2.31-2.ep5.el5.noarch.rpm tomcat5-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-admin-webapps-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-common-lib-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-jasper-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-jasper-eclipse-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-jasper-javadoc-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-jsp-2.0-api-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-jsp-2.0-api-javadoc-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-parent-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-server-lib-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-servlet-2.4-api-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-servlet-2.4-api-javadoc-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-webapps-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat6-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm tomcat6-admin-webapps-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm tomcat6-docs-webapp-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm tomcat6-el-1.0-api-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm tomcat6-javadoc-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm tomcat6-jsp-2.1-api-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm tomcat6-lib-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm tomcat6-log4j-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm tomcat6-servlet-2.5-api-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm tomcat6-webapps-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm xalan-j2-2.7.1-5.3_patch_04.ep5.el5.noarch.rpm xerces-j2-2.9.1-3.patch01.1.ep5.el5.noarch.rpm xml-commons-1.3.04-7.10.jdk6.ep5.el5.noarch.rpm xml-commons-jaxp-1.2-apis-1.3.04-7.10.jdk6.ep5.el5.noarch.rpm xml-commons-jaxp-1.3-apis-1.3.04-7.10.jdk6.ep5.el5.noarch.rpm xml-commons-resolver12-1.3.04-7.10.jdk6.ep5.el5.noarch.rpm
x86_64: httpd-2.2.17-11.1.ep5.el5.x86_64.rpm httpd-debuginfo-2.2.17-11.1.ep5.el5.x86_64.rpm httpd-devel-2.2.17-11.1.ep5.el5.x86_64.rpm httpd-manual-2.2.17-11.1.ep5.el5.x86_64.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el5.x86_64.rpm jakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el5.x86_64.rpm mod_cluster-native-1.0.10-2.1.GA_CP01.ep5.el5.x86_64.rpm mod_cluster-native-debuginfo-1.0.10-2.1.GA_CP01.ep5.el5.x86_64.rpm mod_jk-ap20-1.2.31-1.1.ep5.el5.x86_64.rpm mod_jk-debuginfo-1.2.31-1.1.ep5.el5.x86_64.rpm mod_jk-manual-1.2.31-1.1.ep5.el5.x86_64.rpm mod_ssl-2.2.17-11.1.ep5.el5.x86_64.rpm tomcat-native-1.1.20-2.1.ep5.el5.x86_64.rpm tomcat-native-debuginfo-1.1.20-2.1.ep5.el5.x86_64.rpm
JBoss Enterprise Web Server 1.0 for RHEL 6 Server:
Source: ant-1.7.1-14.ep5.el6.src.rpm antlr-2.7.7-7.ep5.el6.src.rpm cglib-2.2-5.4.ep5.el6.src.rpm dom4j-1.6.1-11.1.ep5.el6.src.rpm ecj3-3.3.1.1-4.ep5.el6.src.rpm glassfish-jsf-1.2_13-3.1.4.ep5.el6.src.rpm hibernate3-3.3.2-1.8.GA_CP04.ep5.el6.src.rpm hibernate3-annotations-3.4.0-3.5.GA_CP04.ep5.el6.src.rpm hibernate3-commons-annotations-3.1.0-1.8.ep5.el6.src.rpm hibernate3-ejb-persistence-3.0-api-1.0.2-3.3.ep5.el6.src.rpm hibernate3-entitymanager-3.4.0-4.4.GA_CP04.ep5.el6.src.rpm httpd-2.2.17-11.2.ep5.el6.src.rpm jakarta-commons-beanutils-1.8.0-9.ep5.el6.src.rpm jakarta-commons-chain-1.2-2.2.2.ep5.el6.src.rpm jakarta-commons-codec-1.3-12.1.ep5.el6.src.rpm jakarta-commons-collections-3.2.1-4.ep5.el6.src.rpm jakarta-commons-daemon-1.0.5-1.1.ep5.el6.src.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el6.src.rpm jakarta-commons-dbcp-1.2.1-16.2.ep5.el6.src.rpm jakarta-commons-digester-1.8.1-8.1.1.1.ep5.el6.src.rpm jakarta-commons-fileupload-1.1.1-7.5.ep5.el6.src.rpm jakarta-commons-httpclient-3.1-1.2.2.ep5.el6.src.rpm jakarta-commons-io-1.4-4.ep5.el6.src.rpm jakarta-commons-logging-1.1.1-1.ep5.el6.src.rpm jakarta-commons-logging-jboss-1.1-10.2.2.1.ep5.el6.src.rpm jakarta-commons-pool-1.3-15.ep5.el6.src.rpm jakarta-commons-validator-1.3.1-7.5.2.ep5.el6.src.rpm jakarta-oro-2.0.8-7.ep5.el6.src.rpm jakarta-taglibs-standard-1.1.1-12.ep5.el6.src.rpm javassist-3.12.0-3.ep5.el6.src.rpm jboss-common-core-2.2.17-1.2.ep5.el6.src.rpm jboss-common-logging-jdk-2.1.2-1.2.ep5.el6.src.rpm jboss-common-logging-spi-2.1.2-1.ep5.el6.src.rpm jboss-javaee-5.0.1-2.9.ep5.el6.src.rpm jcommon-1.0.16-1.2.2.ep5.el6.src.rpm jfreechart-1.0.13-2.3.2.1.2.ep5.el6.src.rpm mod_cluster-1.0.10-2.2.GA_CP01.ep5.el6.src.rpm mod_cluster-native-1.0.10-2.1.1.GA_CP01.ep5.el6.src.rpm mod_jk-1.2.31-1.1.2.ep5.el6.src.rpm objectweb-asm31-3.1-12.1.ep5.el6.src.rpm struts12-1.2.9-3.1.ep5.el6.src.rpm tomcat-jkstatus-ant-1.2.31-2.1.ep5.el6.src.rpm tomcat-native-1.1.20-2.1.2.ep5.el6.src.rpm tomcat5-5.5.33-15_patch_04.ep5.el6.src.rpm tomcat6-6.0.32-14_patch_03.ep5.el6.src.rpm xalan-j2-2.7.1-5.3_patch_04.ep5.el6.src.rpm xerces-j2-2.9.1-8.patch01.1.ep5.el6.src.rpm xml-commons-1.3.04-7.14.ep5.el6.src.rpm
i386: httpd-2.2.17-11.2.ep5.el6.i386.rpm httpd-debuginfo-2.2.17-11.2.ep5.el6.i386.rpm httpd-devel-2.2.17-11.2.ep5.el6.i386.rpm httpd-manual-2.2.17-11.2.ep5.el6.i386.rpm httpd-tools-2.2.17-11.2.ep5.el6.i386.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el6.i386.rpm jakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el6.i386.rpm mod_cluster-native-1.0.10-2.1.1.GA_CP01.ep5.el6.i386.rpm mod_cluster-native-debuginfo-1.0.10-2.1.1.GA_CP01.ep5.el6.i386.rpm mod_jk-ap20-1.2.31-1.1.2.ep5.el6.i386.rpm mod_jk-debuginfo-1.2.31-1.1.2.ep5.el6.i386.rpm mod_jk-manual-1.2.31-1.1.2.ep5.el6.i386.rpm mod_ssl-2.2.17-11.2.ep5.el6.i386.rpm tomcat-native-1.1.20-2.1.2.ep5.el6.i386.rpm tomcat-native-debuginfo-1.1.20-2.1.2.ep5.el6.i386.rpm
noarch: ant-1.7.1-14.ep5.el6.noarch.rpm ant-antlr-1.7.1-14.ep5.el6.noarch.rpm ant-apache-bcel-1.7.1-14.ep5.el6.noarch.rpm ant-apache-bsf-1.7.1-14.ep5.el6.noarch.rpm ant-apache-log4j-1.7.1-14.ep5.el6.noarch.rpm ant-apache-oro-1.7.1-14.ep5.el6.noarch.rpm ant-apache-regexp-1.7.1-14.ep5.el6.noarch.rpm ant-apache-resolver-1.7.1-14.ep5.el6.noarch.rpm ant-commons-logging-1.7.1-14.ep5.el6.noarch.rpm ant-commons-net-1.7.1-14.ep5.el6.noarch.rpm ant-javamail-1.7.1-14.ep5.el6.noarch.rpm ant-jdepend-1.7.1-14.ep5.el6.noarch.rpm ant-jmf-1.7.1-14.ep5.el6.noarch.rpm ant-jsch-1.7.1-14.ep5.el6.noarch.rpm ant-junit-1.7.1-14.ep5.el6.noarch.rpm ant-nodeps-1.7.1-14.ep5.el6.noarch.rpm ant-scripts-1.7.1-14.ep5.el6.noarch.rpm ant-swing-1.7.1-14.ep5.el6.noarch.rpm ant-trax-1.7.1-14.ep5.el6.noarch.rpm antlr-2.7.7-7.ep5.el6.noarch.rpm cglib-2.2-5.4.ep5.el6.noarch.rpm dom4j-1.6.1-11.1.ep5.el6.noarch.rpm ecj3-3.3.1.1-4.ep5.el6.noarch.rpm glassfish-jsf-1.2_13-3.1.4.ep5.el6.noarch.rpm hibernate3-3.3.2-1.8.GA_CP04.ep5.el6.noarch.rpm hibernate3-annotations-3.4.0-3.5.GA_CP04.ep5.el6.noarch.rpm hibernate3-annotations-javadoc-3.4.0-3.5.GA_CP04.ep5.el6.noarch.rpm hibernate3-commons-annotations-3.1.0-1.8.ep5.el6.noarch.rpm hibernate3-commons-annotations-javadoc-3.1.0-1.8.ep5.el6.noarch.rpm hibernate3-ejb-persistence-3.0-api-1.0.2-3.3.ep5.el6.noarch.rpm hibernate3-ejb-persistence-3.0-api-javadoc-1.0.2-3.3.ep5.el6.noarch.rpm hibernate3-entitymanager-3.4.0-4.4.GA_CP04.ep5.el6.noarch.rpm hibernate3-entitymanager-javadoc-3.4.0-4.4.GA_CP04.ep5.el6.noarch.rpm hibernate3-javadoc-3.3.2-1.8.GA_CP04.ep5.el6.noarch.rpm jakarta-commons-beanutils-1.8.0-9.ep5.el6.noarch.rpm jakarta-commons-chain-1.2-2.2.2.ep5.el6.noarch.rpm jakarta-commons-codec-1.3-12.1.ep5.el6.noarch.rpm jakarta-commons-collections-3.2.1-4.ep5.el6.noarch.rpm jakarta-commons-collections-tomcat5-3.2.1-4.ep5.el6.noarch.rpm jakarta-commons-daemon-1.0.5-1.1.ep5.el6.noarch.rpm jakarta-commons-dbcp-1.2.1-16.2.ep5.el6.noarch.rpm jakarta-commons-dbcp-tomcat5-1.2.1-16.2.ep5.el6.noarch.rpm jakarta-commons-digester-1.8.1-8.1.1.1.ep5.el6.noarch.rpm jakarta-commons-fileupload-1.1.1-7.5.ep5.el6.noarch.rpm jakarta-commons-httpclient-3.1-1.2.2.ep5.el6.noarch.rpm jakarta-commons-io-1.4-4.ep5.el6.noarch.rpm jakarta-commons-logging-1.1.1-1.ep5.el6.noarch.rpm jakarta-commons-logging-jboss-1.1-10.2.2.1.ep5.el6.noarch.rpm jakarta-commons-logging-tomcat6-1.1.1-1.ep5.el6.noarch.rpm jakarta-commons-pool-1.3-15.ep5.el6.noarch.rpm jakarta-commons-pool-tomcat5-1.3-15.ep5.el6.noarch.rpm jakarta-commons-validator-1.3.1-7.5.2.ep5.el6.noarch.rpm jakarta-oro-2.0.8-7.ep5.el6.noarch.rpm jakarta-taglibs-standard-1.1.1-12.ep5.el6.noarch.rpm javassist-3.12.0-3.ep5.el6.noarch.rpm jboss-common-core-2.2.17-1.2.ep5.el6.noarch.rpm jboss-common-logging-jdk-2.1.2-1.2.ep5.el6.noarch.rpm jboss-common-logging-spi-2.1.2-1.ep5.el6.noarch.rpm jboss-javaee-5.0.1-2.9.ep5.el6.noarch.rpm jboss-javaee-poms-5.0.1-2.9.ep5.el6.noarch.rpm jboss-jms-1.1-api-5.0.1-2.9.ep5.el6.noarch.rpm jboss-transaction-1.0.1-api-5.0.1-2.9.ep5.el6.noarch.rpm jcommon-1.0.16-1.2.2.ep5.el6.noarch.rpm jfreechart-1.0.13-2.3.2.1.2.ep5.el6.noarch.rpm mod_cluster-demo-1.0.10-2.2.GA_CP01.ep5.el6.noarch.rpm mod_cluster-jbossas-1.0.10-2.2.GA_CP01.ep5.el6.noarch.rpm mod_cluster-jbossweb2-1.0.10-2.2.GA_CP01.ep5.el6.noarch.rpm mod_cluster-tomcat6-1.0.10-2.2.GA_CP01.ep5.el6.noarch.rpm objectweb-asm31-3.1-12.1.ep5.el6.noarch.rpm struts12-1.2.9-3.1.ep5.el6.noarch.rpm tomcat-jkstatus-ant-1.2.31-2.1.ep5.el6.noarch.rpm tomcat5-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-admin-webapps-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-common-lib-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-jasper-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-jasper-eclipse-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-jasper-javadoc-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-jsp-2.0-api-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-jsp-2.0-api-javadoc-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-parent-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-server-lib-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-servlet-2.4-api-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-servlet-2.4-api-javadoc-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-webapps-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat6-6.0.32-14_patch_03.ep5.el6.noarch.rpm tomcat6-admin-webapps-6.0.32-14_patch_03.ep5.el6.noarch.rpm tomcat6-docs-webapp-6.0.32-14_patch_03.ep5.el6.noarch.rpm tomcat6-el-1.0-api-6.0.32-14_patch_03.ep5.el6.noarch.rpm tomcat6-javadoc-6.0.32-14_patch_03.ep5.el6.noarch.rpm tomcat6-jsp-2.1-api-6.0.32-14_patch_03.ep5.el6.noarch.rpm tomcat6-lib-6.0.32-14_patch_03.ep5.el6.noarch.rpm tomcat6-log4j-6.0.32-14_patch_03.ep5.el6.noarch.rpm tomcat6-servlet-2.5-api-6.0.32-14_patch_03.ep5.el6.noarch.rpm tomcat6-webapps-6.0.32-14_patch_03.ep5.el6.noarch.rpm xalan-j2-2.7.1-5.3_patch_04.ep5.el6.noarch.rpm xerces-j2-2.9.1-8.patch01.1.ep5.el6.noarch.rpm xml-commons-1.3.04-7.14.ep5.el6.noarch.rpm xml-commons-jaxp-1.1-apis-1.3.04-7.14.ep5.el6.noarch.rpm xml-commons-jaxp-1.2-apis-1.3.04-7.14.ep5.el6.noarch.rpm xml-commons-jaxp-1.3-apis-1.3.04-7.14.ep5.el6.noarch.rpm xml-commons-resolver10-1.3.04-7.14.ep5.el6.noarch.rpm xml-commons-resolver11-1.3.04-7.14.ep5.el6.noarch.rpm xml-commons-resolver12-1.3.04-7.14.ep5.el6.noarch.rpm xml-commons-which10-1.3.04-7.14.ep5.el6.noarch.rpm xml-commons-which11-1.3.04-7.14.ep5.el6.noarch.rpm
x86_64: httpd-2.2.17-11.2.ep5.el6.x86_64.rpm httpd-debuginfo-2.2.17-11.2.ep5.el6.x86_64.rpm httpd-devel-2.2.17-11.2.ep5.el6.x86_64.rpm httpd-manual-2.2.17-11.2.ep5.el6.x86_64.rpm httpd-tools-2.2.17-11.2.ep5.el6.x86_64.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el6.x86_64.rpm jakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el6.x86_64.rpm mod_cluster-native-1.0.10-2.1.1.GA_CP01.ep5.el6.x86_64.rpm mod_cluster-native-debuginfo-1.0.10-2.1.1.GA_CP01.ep5.el6.x86_64.rpm mod_jk-ap20-1.2.31-1.1.2.ep5.el6.x86_64.rpm mod_jk-debuginfo-1.2.31-1.1.2.ep5.el6.x86_64.rpm mod_jk-manual-1.2.31-1.1.2.ep5.el6.x86_64.rpm mod_ssl-2.2.17-11.2.ep5.el6.x86_64.rpm tomcat-native-1.1.20-2.1.2.ep5.el6.x86_64.rpm tomcat-native-debuginfo-1.1.20-2.1.2.ep5.el6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2010-1157.html https://www.redhat.com/security/data/cve/CVE-2010-1452.html https://www.redhat.com/security/data/cve/CVE-2010-1623.html https://www.redhat.com/security/data/cve/CVE-2010-3718.html https://www.redhat.com/security/data/cve/CVE-2010-4172.html https://www.redhat.com/security/data/cve/CVE-2011-0013.html https://www.redhat.com/security/data/cve/CVE-2011-0419.html https://access.redhat.com/security/updates/classification/#moderate http://docs.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0/html-single/Release_Notes_1.0.2/index.html
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFOAubvXlSAg2UNWIIRApW6AJ4kvQ3q2boy3UntDB/XSHBuOmN02QCgmLaj NXAWrqe0nO3HRh9R1bnYZR0= =YW2z -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "netbsd",
"scope": "eq",
"trust": 1.8,
"vendor": "netbsd",
"version": "5.1"
},
{
"_id": null,
"model": "openbsd",
"scope": "eq",
"trust": 1.8,
"vendor": "openbsd",
"version": "4.8"
},
{
"_id": null,
"model": "solaris",
"scope": "eq",
"trust": 1.8,
"vendor": "oracle",
"version": "10"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "6.0"
},
{
"_id": null,
"model": "http server",
"scope": "gte",
"trust": 1.0,
"vendor": "apache",
"version": "2.2.0"
},
{
"_id": null,
"model": "freebsd",
"scope": "eq",
"trust": 1.0,
"vendor": "freebsd",
"version": "*"
},
{
"_id": null,
"model": "android",
"scope": "eq",
"trust": 1.0,
"vendor": "google",
"version": "*"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "7.0"
},
{
"_id": null,
"model": "mac os x",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "10.6.0"
},
{
"_id": null,
"model": "http server",
"scope": "gte",
"trust": 1.0,
"vendor": "apache",
"version": "2.0.0"
},
{
"_id": null,
"model": "http server",
"scope": "lte",
"trust": 1.0,
"vendor": "apache",
"version": "2.0.65"
},
{
"_id": null,
"model": "http server",
"scope": "lte",
"trust": 1.0,
"vendor": "apache",
"version": "2.2.18"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "5.0"
},
{
"_id": null,
"model": "linux enterprise server",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "10"
},
{
"_id": null,
"model": "portable runtime",
"scope": "lt",
"trust": 1.0,
"vendor": "apache",
"version": "1.4.3"
},
{
"_id": null,
"model": "http server",
"scope": "lt",
"trust": 0.8,
"vendor": "apache",
"version": "2.2.18"
},
{
"_id": null,
"model": "portable runtime",
"scope": "lt",
"trust": 0.8,
"vendor": "apache",
"version": "1.4.4"
},
{
"_id": null,
"model": "freebsd",
"scope": null,
"trust": 0.8,
"vendor": "freebsd",
"version": null
},
{
"_id": null,
"model": "android",
"scope": null,
"trust": 0.8,
"vendor": "google",
"version": null
},
{
"_id": null,
"model": "http server",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "6.1.0.39"
},
{
"_id": null,
"model": "http server",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "7.0.0.19"
},
{
"_id": null,
"model": "http server",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "8.0.0.1"
},
{
"_id": null,
"model": "mac os x",
"scope": null,
"trust": 0.8,
"vendor": "apple",
"version": null
},
{
"_id": null,
"model": "http server",
"scope": null,
"trust": 0.8,
"vendor": "oracle",
"version": null
},
{
"_id": null,
"model": "solaris",
"scope": "eq",
"trust": 0.8,
"vendor": "oracle",
"version": "9"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3 (x86)"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3 (x86-64)"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3.0"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3.0 (x86-64)"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "4.0"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "4.0 (x86-64)"
},
{
"_id": null,
"model": "turbolinux appliance server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "2.0 ( extended maintenance )"
},
{
"_id": null,
"model": "turbolinux appliance server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "3.0"
},
{
"_id": null,
"model": "turbolinux appliance server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "3.0 (x64)"
},
{
"_id": null,
"model": "turbolinux client",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "2008"
},
{
"_id": null,
"model": "turbolinux fuji",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "( extended maintenance )"
},
{
"_id": null,
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "10 ( extended maintenance )"
},
{
"_id": null,
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "10 (x64) ( extended maintenance )"
},
{
"_id": null,
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "11"
},
{
"_id": null,
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "11 (x64)"
},
{
"_id": null,
"model": "hp secure web server for openvms",
"scope": "lte",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "v2.2"
},
{
"_id": null,
"model": "hp-ux",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "11.23"
},
{
"_id": null,
"model": "hp-ux",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "11.31"
},
{
"_id": null,
"model": "hp-ux web server suite",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "v3.18"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (as)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (es)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (ws)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4.8 (as)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4.8 (es)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5 (server)"
},
{
"_id": null,
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4.0"
},
{
"_id": null,
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5.0 (client)"
},
{
"_id": null,
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "6"
},
{
"_id": null,
"model": "enterprise linux eus",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5.6.z (server)"
},
{
"_id": null,
"model": "enterprise linux hpc node",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "6"
},
{
"_id": null,
"model": "enterprise linux long life",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "(v. 5.6 server)"
},
{
"_id": null,
"model": "enterprise linux server",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "6"
},
{
"_id": null,
"model": "enterprise linux server eus",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "6.0.z"
},
{
"_id": null,
"model": "enterprise linux workstation",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "6"
},
{
"_id": null,
"model": "rhel desktop workstation",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5 (client)"
},
{
"_id": null,
"model": "cosminexus http server",
"scope": null,
"trust": 0.8,
"vendor": "hitachi",
"version": null
},
{
"_id": null,
"model": "web server",
"scope": null,
"trust": 0.8,
"vendor": "hitachi",
"version": null
},
{
"_id": null,
"model": "interstage application server",
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"_id": null,
"model": "interstage studio",
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"_id": null,
"model": "interstage web server",
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "1.3.28"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "1.3.32"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "1.3.27"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "1.3.26"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "1.3.24"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "1.3.31"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "1.3.30"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "1.3.25"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "1.3.23"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "1.3.29"
}
],
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201105-160"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001638"
},
{
"db": "NVD",
"id": "CVE-2011-0419"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:apache:http_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:apache:portable_runtime",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:freebsd:freebsd",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:google:android",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:ibm:http_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:netbsd:netbsd",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:apple:mac_os_x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:oracle:http_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:oracle:solaris",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:turbolinux:turbolinux_appliance_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:turbolinux:turbolinux_client",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:turbolinux:turbolinux_fuji",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:turbolinux:turbolinux_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hp:secure_web_server_for_open_vms",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:hp:hp-ux",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hp:hp-ux_web_server_suite",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux_eus",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux_hpc_node",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux_long_life",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:redhat:rhel_server_eus",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux_workstation",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:rhel_desktop_workstation",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:cosminexus_http_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:hitachi_web_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:fujitsu:interstage_application_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:fujitsu:interstage_studio",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:fujitsu:interstage_web_server",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-001638"
}
]
},
"credits": {
"_id": null,
"data": "HP",
"sources": [
{
"db": "PACKETSTORM",
"id": "104936"
},
{
"db": "PACKETSTORM",
"id": "112043"
},
{
"db": "PACKETSTORM",
"id": "106415"
},
{
"db": "PACKETSTORM",
"id": "106416"
}
],
"trust": 0.4
},
"cve": "CVE-2011-0419",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CVE-2011-0419",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-48364",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2011-0419",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2011-0419",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-201105-160",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-48364",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-48364"
},
{
"db": "CNNVD",
"id": "CNNVD-201105-160"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001638"
},
{
"db": "NVD",
"id": "CVE-2011-0419"
}
]
},
"description": {
"_id": null,
"data": "Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd. It mainly provides an underlying support interface library for upper-level applications that can be used across multiple operating system platforms. NetBSD is a free and open source Unix-like operating system developed by the NetBSD Foundation. This update fixes this problem (CVE-2011-1928). \n\nFor reference, the description of the original DSA, which fixed\nCVE-2011-0419:\n\nA flaw was found in the APR library, which could be exploited through\nApache HTTPD\u0027s mod_autoindex. This could be used in a denial of service attack. \n\n\nFor the oldstable distribution (lenny), this problem has been fixed in\nversion 1.2.12-5+lenny4. \n\nFor the stable distribution (squeeze), this problem has been fixed in\nversion 1.4.2-6+squeeze2. \n\nFor the testing distribution (wheezy), this problem will be fixed in\nversion 1.4.5-1. \n\nFor the unstable distribution (sid), this problem will be fixed in\nversion 1.4.5-1. \n\nWe recommend that you upgrade your apr packages and restart the\napache2 server. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. \n\nRelease Date: 2011-09-08\nLast Updated: 2011-09-08\n\n ------------------------------------------------------------------------------\n\nPotential Security Impact: Remote Denial of Service (DoS)\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified with HP-UX Apache Web Server. These vulnerability could be exploited remotely to create a Denial of Service (DoS). \n\nReferences: CVE-2011-3192, CVE-2011-0419\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP-UX B.11.23, B.11.31 running HP-UX Apache Web Server Suite v3.15 or earlier\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2011-3192 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8\nCVE-2011-0419 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nThis bulletin will be revised when additional information becomes available. \n\nHP has provided the following software update to resolve this vulnerability. \n\nThe update is available for download from the following location\nftp://srt10606:P2xg=AD5@ftp.usa.hp.com\nor https://ftp.usa.hp.com/hprc/home with\nusername srt10606 and password P2xg=AD5\n\nHP-UX Web Server Suite v.3.18 containing Apache v2.2.15.08 HP-UX 11i Release\n Apache Depot name\n\nB.11.23 (32-bit) / Apache-CVE-2011-3192-Fix-IA-PA-32.depot\n\nB.11.23 (64-bit) / Apache-CVE-2011-3192-Fix-IA-PA-64.depot\n\nB.11.31 (32-bit) / Apache-CVE-2011-3192-Fix-IA-PA-32.depot\n\nB.11.31 (64-bit) / Apache-CVE-2011-3192-Fix-IA-PA-64.depot\n\nFor customers not wanting to install this preliminary patch, we recommend that three work arounds be considered from the Apache Software Foundation. \n\n1) Use SetEnvIf or mod_rewrite to detect a large number of ranges and then either ignore the Range: header or reject the request. \n\n2) Limit the size of the request field to a few hundred bytes. \n\n3) Use mod_headers to completely disallow the use of Range headers. \n\nPlease refer to the Apache advisory for details. http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3c20110826103531.998348F82@minotaur.apache.org%3e\n\nMANUAL ACTIONS: Yes - Update\nInstall HP-UX Web Server Suite v3.18 or subsequent. \n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. \n\nIt analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see https://www.hp.com/go/swa\n\nThe following text is for use by the HP-UX Software Assistant. \n\nAFFECTED VERSIONS\n\nHP-UX Web Server Suite v3.18\nHP-UX B.11.23\nHP-UX B.11.31\n==================\nhpuxws22APCH32.APACHE\nhpuxws22APCH32.APACHE2\nhpuxws22APCH32.AUTH_LDAP\nhpuxws22APCH32.AUTH_LDAP2\nhpuxws22APCH32.MOD_JK\nhpuxws22APCH32.MOD_JK2\nhpuxws22APCH32.MOD_PERL\nhpuxws22APCH32.MOD_PERL2\nhpuxws22APCH32.PHP\nhpuxws22APCH32.PHP2\nhpuxws22APCH32.WEBPROXY\nhpuxws22APCH32.WEBPROXY2\nhpuxws22APACHE.APACHE\nhpuxws22APACHE.APACHE2\nhpuxws22APACHE.AUTH_LDAP\nhpuxws22APACHE.AUTH_LDAP2\nhpuxws22APACHE.MOD_JK\nhpuxws22APACHE.MOD_JK2\nhpuxws22APACHE.MOD_PERL\nhpuxws22APACHE.MOD_PERL2\nhpuxws22APACHE.PHP\nhpuxws22APACHE.PHP2\nhpuxws22APACHE.WEBPROXY\nhpuxws22APACHE.WEBPROXY2\naction: install revision B.2.2.15.08 or subsequent\n\nEND AFFECTED VERSIONS\n\nHISTORY\nVersion:1 (rev.1) - 8 September 2011 Initial release\n\nThird Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer\u0027s patch management policy. \n\nSupport: For further information, contact normal HP Services support channel. \n\nReport: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430\n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2011 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided \"as is\" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. \nHP System Management Homepage (SMH) before v7.0 running on Linux and Windows. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. ==========================================================================\nUbuntu Security Notice USN-1134-1\nMay 24, 2011\n\napache2, apr vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 11.04\n- Ubuntu 10.10\n- Ubuntu 10.04 LTS\n- Ubuntu 8.04 LTS\n- Ubuntu 6.06 LTS\n\nSummary:\n\nA denial of service issue exists that affects the Apache web server. (CVE-2011-0419)\n\nIs was discovered that the fix for CVE-2011-0419 introduced a different\nflaw in the fnmatch() implementation that could also result in a\ndenial of service. (CVE-2011-1928)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 11.04:\n libapr1 1.4.2-7ubuntu2.1\n\nUbuntu 10.10:\n libapr1 1.4.2-3ubuntu1.1\n\nUbuntu 10.04 LTS:\n libapr1 1.3.8-1ubuntu0.3\n\nUbuntu 8.04 LTS:\n libapr1 1.2.11-1ubuntu0.2\n\nUbuntu 6.06 LTS:\n libapr0 2.0.55-4ubuntu2.13\n\nAfter a standard system update you need to restart the Apache web\nserver or any other service that depends on the APR library to make\nall the necessary changes. Upgrade to WSS v3.19\n\nB.11.31 (32 \u0026 64-bit) / No longer supported. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: JBoss Enterprise Web Server 1.0.2 update\nAdvisory ID: RHSA-2011:0897-01\nProduct: JBoss Enterprise Web Server\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2011-0897.html\nIssue date: 2011-06-22\nCVE Names: CVE-2010-1157 CVE-2010-1452 CVE-2010-1623 \n CVE-2010-3718 CVE-2010-4172 CVE-2011-0013 \n CVE-2011-0419 \n=====================================================================\n\n1. Summary:\n\nJBoss Enterprise Web Server 1.0.2 is now available for Red Hat Enterprise\nLinux 4, 5, and 6. \n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nJBoss Enterprise Web Server 1.0 for RHEL 4 AS - i386, noarch, x86_64\nJBoss Enterprise Web Server 1.0 for RHEL 4 ES - i386, noarch, x86_64\nJBoss Enterprise Web Server 1.0 for RHEL 5 Server - i386, noarch, x86_64\nJBoss Enterprise Web Server 1.0 for RHEL 6 Server - i386, noarch, x86_64\n\n3. Description:\n\nJBoss Enterprise Web Server is a fully-integrated and certified set of\ncomponents for hosting Java web applications. \n\nThis is the first release of JBoss Enterprise Web Server for Red Hat\nEnterprise Linux 6. For Red Hat Enterprise Linux 4 and 5, this release\nserves as a replacement for JBoss Enterprise Web Server 1.0.1, and includes\na number of bug fixes. Refer to the Release Notes, linked in the\nReferences, for more information. \n\nThis update corrects security flaws in the following components:\n\ntomcat6:\n\nA cross-site scripting (XSS) flaw was found in the Manager application,\nused for managing web applications on Apache Tomcat. If a remote attacker\ncould trick a user who is logged into the Manager application into visiting\na specially-crafted URL, the attacker could perform Manager application\ntasks with the privileges of the logged in user. (CVE-2010-4172)\n\ntomcat5 and tomcat6:\n\nIt was found that web applications could modify the location of the Apache\nTomcat host\u0027s work directory. As web applications deployed on Tomcat have\nread and write access to this directory, a malicious web application could\nuse this flaw to trick Tomcat into giving it read and write access to an\narbitrary directory on the file system. (CVE-2010-3718)\n\nA second cross-site scripting (XSS) flaw was found in the Manager\napplication. A malicious web application could use this flaw to conduct an\nXSS attack, leading to arbitrary web script execution with the privileges\nof victims who are logged into and viewing Manager application web pages. \n(CVE-2011-0013)\n\nA possible minor information leak was found in the way Apache Tomcat\ngenerated HTTP BASIC and DIGEST authentication requests. For configurations\nwhere a realm name was not specified and Tomcat was accessed via a proxy,\nthe default generated realm contained the hostname and port used by the\nproxy to send requests to the Tomcat server. (CVE-2010-1157)\n\nhttpd:\n\nA flaw was found in the way the mod_dav module of the Apache HTTP Server\nhandled certain requests. If a remote attacker were to send a carefully\ncrafted request to the server, it could cause the httpd child process to\ncrash. (CVE-2010-1452)\n\napr:\n\nIt was found that the apr_fnmatch() function used an unconstrained\nrecursion when processing patterns with the \u0027*\u0027 wildcard. An attacker could\nuse this flaw to cause an application using this function, which also\naccepted untrusted input as a pattern for matching (such as an httpd server\nusing the mod_autoindex module), to exhaust all stack memory or use an\nexcessive amount of CPU time when performing matching. (CVE-2011-0419)\n\napr-util:\n\nIt was found that certain input could cause the apr-util library to\nallocate more memory than intended in the apr_brigade_split_line()\nfunction. An attacker able to provide input in small chunks to an\napplication using the apr-util library (such as httpd) could possibly use\nthis flaw to trigger high memory consumption. Note: This issue only\naffected the JBoss Enterprise Web Server packages on Red Hat Enterprise\nLinux 4. (CVE-2010-1623)\n\nAll users of JBoss Enterprise Web Server 1.0.1 are advised to upgrade to\nJBoss Enterprise Web Server 1.0.2, which corrects these issues. After\ninstalling this update, the relevant Apache Tomcat service (\"tomcat5\" or\n\"tomcat6\") and the Apache HTTP Server (\"httpd\") must be restarted for the\nupdate to take effect. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\n5. Bugs fixed (http://bugzilla.redhat.com/):\n\n585331 - CVE-2010-1157 tomcat: information disclosure in authentication headers\n618189 - CVE-2010-1452 httpd mod_cache, mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments\n640281 - CVE-2010-1623 apr-util: high memory consumption in apr_brigade_split_line()\n656246 - CVE-2010-4172 tomcat: cross-site-scripting vulnerability in the manager application\n675786 - CVE-2011-0013 tomcat: XSS vulnerability in HTML Manager interface\n675792 - CVE-2010-3718 tomcat: file permission bypass flaw\n677655 - JBEWS 1.0.2 release tracker bug for RHEL 4\n677657 - JBEWS 1.0.2 release tracker bug for RHEL-5\n677659 - JBEWS 1.0.2 release tracker bug for RHEL-6\n703390 - CVE-2011-0419 apr: unconstrained recursion in apr_fnmatch\n\n6. Package List:\n\nJBoss Enterprise Web Server 1.0 for RHEL 4 AS:\n\nSource:\nant-1.7.1-13.jdk6.ep5.el4.src.rpm\nantlr-2.7.7-7.ep5.el4.src.rpm\nbcel-5.2-8.1.ep5.el4.src.rpm\ncglib-2.2-5.1.1.jdk6.ep5.el4.src.rpm\ndom4j-1.6.1-11.ep5.el4.src.rpm\necj-3.3.1.1-3.2.2.jdk6.ep5.el4.src.rpm\nglassfish-jaf-1.1.0-6.1.1.jdk6.ep5.el4.src.rpm\nglassfish-javamail-1.4.2-0.4.ep5.el4.src.rpm\nglassfish-jsf-1.2_13-2.2.1.jdk6.ep5.el4.src.rpm\nhibernate3-3.3.2-1.5.GA_CP04.ep5.el4.src.rpm\nhibernate3-annotations-3.4.0-3.3.GA_CP04.ep5.el4.src.rpm\nhibernate3-commons-annotations-3.1.0-1.8.ep5.el4.src.rpm\nhibernate3-ejb-persistence-3.0-api-1.0.2-3.jdk6.ep5.el4.src.rpm\nhibernate3-entitymanager-3.4.0-4.3.GA_CP04.ep5.el4.src.rpm\nhttpd22-2.2.17-14.ep5.el4.src.rpm\njakarta-commons-beanutils-1.8.0-4.1.1.jdk6.ep5.el4.src.rpm\njakarta-commons-chain-1.2-2.2.ep5.el4.src.rpm\njakarta-commons-codec-1.3-9.1.1.jdk6.ep5.el4.src.rpm\njakarta-commons-collections-3.2.1-4.ep5.el4.src.rpm\njakarta-commons-daemon-1.0.5-1.ep5.el4.src.rpm\njakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el4.src.rpm\njakarta-commons-dbcp-1.2.1-16.4.ep5.el4.src.rpm\njakarta-commons-digester-1.8.1-8.1.jdk6.ep5.el4.src.rpm\njakarta-commons-el-1.0-19.2.jdk6.ep5.el4.src.rpm\njakarta-commons-fileupload-1.1.1-7.4.ep5.el4.src.rpm\njakarta-commons-httpclient-3.1-1.1.1.jdk6.ep5.el4.src.rpm\njakarta-commons-io-1.4-1.3.1.jdk6.ep5.el4.src.rpm\njakarta-commons-launcher-1.1-4.6.1.ep5.el4.src.rpm\njakarta-commons-logging-1.1.1-0.4.1.jdk6.ep5.el4.src.rpm\njakarta-commons-logging-jboss-1.1-10.2.1.jdk6.ep5.el4.src.rpm\njakarta-commons-modeler-2.0-4.ep5.el4.src.rpm\njakarta-commons-pool-1.3-11.2.1.jdk6.ep5.el4.src.rpm\njakarta-commons-validator-1.3.1-7.5.1.ep5.el4.src.rpm\njakarta-oro-2.0.8-3.3.2.1.jdk6.ep5.el4.src.rpm\njakarta-taglibs-standard-1.1.1-9.ep5.el4.src.rpm\njavassist-3.12.0-1.jdk6.ep5.el4.src.rpm\njboss-common-core-2.2.17-1.ep5.el4.src.rpm\njboss-common-logging-jdk-2.1.2-1.ep5.el4.src.rpm\njboss-common-logging-spi-2.1.2-1.ep5.el4.src.rpm\njboss-javaee-5.0.1-2.9.ep5.el4.src.rpm\njcommon-1.0.16-1.2.1.jdk6.ep5.el4.src.rpm\njfreechart-1.0.13-2.3.2.1.jdk6.ep5.el4.src.rpm\nlog4j-1.2.14-18.1.jdk6.ep5.el4.src.rpm\nmod_cluster-1.0.10-2.GA_CP01.ep5.el4.src.rpm\nmod_cluster-native-1.0.10-2.GA_CP01.ep5.el4.src.rpm\nmod_jk-1.2.31-1.ep5.el4.src.rpm\nmx4j-3.0.1-9.3.4.ep5.el4.src.rpm\nobjectweb-asm-3.1-5.3.1.jdk6.ep5.el4.src.rpm\nregexp-1.5-1.2.1.jdk6.ep5.el4.src.rpm\nstruts12-1.2.9-3.ep5.el4.src.rpm\ntomcat-jkstatus-ant-1.2.31-2.ep5.el4.src.rpm\ntomcat-native-1.1.20-2.0.ep5.el4.src.rpm\ntomcat5-5.5.33-14_patch_04.ep5.el4.src.rpm\ntomcat6-6.0.32-15_patch_03.ep5.el4.src.rpm\nxalan-j2-2.7.1-5.3_patch_04.ep5.el4.src.rpm\nxerces-j2-2.9.1-3.patch01.1.ep5.el4.src.rpm\nxml-commons-1.3.04-7.12.ep5.el4.src.rpm\n\ni386:\nhttpd22-2.2.17-14.ep5.el4.i386.rpm\nhttpd22-apr-2.2.17-14.ep5.el4.i386.rpm\nhttpd22-apr-devel-2.2.17-14.ep5.el4.i386.rpm\nhttpd22-apr-util-2.2.17-14.ep5.el4.i386.rpm\nhttpd22-apr-util-devel-2.2.17-14.ep5.el4.i386.rpm\nhttpd22-debuginfo-2.2.17-14.ep5.el4.i386.rpm\nhttpd22-devel-2.2.17-14.ep5.el4.i386.rpm\nhttpd22-manual-2.2.17-14.ep5.el4.i386.rpm\njakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el4.i386.rpm\njakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el4.i386.rpm\nmod_cluster-native-1.0.10-2.GA_CP01.ep5.el4.i386.rpm\nmod_cluster-native-debuginfo-1.0.10-2.GA_CP01.ep5.el4.i386.rpm\nmod_jk-ap20-1.2.31-1.ep5.el4.i386.rpm\nmod_jk-debuginfo-1.2.31-1.ep5.el4.i386.rpm\nmod_jk-manual-1.2.31-1.ep5.el4.i386.rpm\nmod_ssl22-2.2.17-14.ep5.el4.i386.rpm\ntomcat-native-1.1.20-2.0.ep5.el4.i386.rpm\ntomcat-native-debuginfo-1.1.20-2.0.ep5.el4.i386.rpm\n\nnoarch:\nant-1.7.1-13.jdk6.ep5.el4.noarch.rpm\nantlr-2.7.7-7.ep5.el4.noarch.rpm\nbcel-5.2-8.1.ep5.el4.noarch.rpm\ncglib-2.2-5.1.1.jdk6.ep5.el4.noarch.rpm\ndom4j-1.6.1-11.ep5.el4.noarch.rpm\necj-3.3.1.1-3.2.2.jdk6.ep5.el4.noarch.rpm\nglassfish-jaf-1.1.0-6.1.1.jdk6.ep5.el4.noarch.rpm\nglassfish-javamail-1.4.2-0.4.ep5.el4.noarch.rpm\nglassfish-jsf-1.2_13-2.2.1.jdk6.ep5.el4.noarch.rpm\nhibernate3-3.3.2-1.5.GA_CP04.ep5.el4.noarch.rpm\nhibernate3-annotations-3.4.0-3.3.GA_CP04.ep5.el4.noarch.rpm\nhibernate3-annotations-javadoc-3.4.0-3.3.GA_CP04.ep5.el4.noarch.rpm\nhibernate3-commons-annotations-3.1.0-1.8.ep5.el4.noarch.rpm\nhibernate3-commons-annotations-javadoc-3.1.0-1.8.ep5.el4.noarch.rpm\nhibernate3-ejb-persistence-3.0-api-1.0.2-3.jdk6.ep5.el4.noarch.rpm\nhibernate3-ejb-persistence-3.0-api-javadoc-1.0.2-3.jdk6.ep5.el4.noarch.rpm\nhibernate3-entitymanager-3.4.0-4.3.GA_CP04.ep5.el4.noarch.rpm\nhibernate3-entitymanager-javadoc-3.4.0-4.3.GA_CP04.ep5.el4.noarch.rpm\nhibernate3-javadoc-3.3.2-1.5.GA_CP04.ep5.el4.noarch.rpm\njakarta-commons-beanutils-1.8.0-4.1.1.jdk6.ep5.el4.noarch.rpm\njakarta-commons-chain-1.2-2.2.ep5.el4.noarch.rpm\njakarta-commons-codec-1.3-9.1.1.jdk6.ep5.el4.noarch.rpm\njakarta-commons-collections-3.2.1-4.ep5.el4.noarch.rpm\njakarta-commons-collections-tomcat5-3.2.1-4.ep5.el4.noarch.rpm\njakarta-commons-daemon-1.0.5-1.ep5.el4.noarch.rpm\njakarta-commons-dbcp-1.2.1-16.4.ep5.el4.noarch.rpm\njakarta-commons-dbcp-tomcat5-1.2.1-16.4.ep5.el4.noarch.rpm\njakarta-commons-digester-1.8.1-8.1.jdk6.ep5.el4.noarch.rpm\njakarta-commons-el-1.0-19.2.jdk6.ep5.el4.noarch.rpm\njakarta-commons-fileupload-1.1.1-7.4.ep5.el4.noarch.rpm\njakarta-commons-httpclient-3.1-1.1.1.jdk6.ep5.el4.noarch.rpm\njakarta-commons-io-1.4-1.3.1.jdk6.ep5.el4.noarch.rpm\njakarta-commons-launcher-1.1-4.6.1.ep5.el4.noarch.rpm\njakarta-commons-logging-1.1.1-0.4.1.jdk6.ep5.el4.noarch.rpm\njakarta-commons-logging-jboss-1.1-10.2.1.jdk6.ep5.el4.noarch.rpm\njakarta-commons-logging-tomcat6-1.1.1-0.4.1.jdk6.ep5.el4.noarch.rpm\njakarta-commons-modeler-2.0-4.ep5.el4.noarch.rpm\njakarta-commons-pool-1.3-11.2.1.jdk6.ep5.el4.noarch.rpm\njakarta-commons-pool-tomcat5-1.3-11.2.1.jdk6.ep5.el4.noarch.rpm\njakarta-commons-validator-1.3.1-7.5.1.ep5.el4.noarch.rpm\njakarta-oro-2.0.8-3.3.2.1.jdk6.ep5.el4.noarch.rpm\njakarta-taglibs-standard-1.1.1-9.ep5.el4.noarch.rpm\njavassist-3.12.0-1.jdk6.ep5.el4.noarch.rpm\njboss-common-core-2.2.17-1.ep5.el4.noarch.rpm\njboss-common-logging-jdk-2.1.2-1.ep5.el4.noarch.rpm\njboss-common-logging-spi-2.1.2-1.ep5.el4.noarch.rpm\njboss-javaee-poms-5.0.1-2.9.ep5.el4.noarch.rpm\njboss-jms-1.1-api-5.0.1-2.9.ep5.el4.noarch.rpm\njboss-transaction-1.0.1-api-5.0.1-2.9.ep5.el4.noarch.rpm\njcommon-1.0.16-1.2.1.jdk6.ep5.el4.noarch.rpm\njfreechart-1.0.13-2.3.2.1.jdk6.ep5.el4.noarch.rpm\nlog4j-1.2.14-18.1.jdk6.ep5.el4.noarch.rpm\nmod_cluster-demo-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm\nmod_cluster-jbossas-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm\nmod_cluster-jbossweb2-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm\nmod_cluster-tomcat6-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm\nmx4j-3.0.1-9.3.4.ep5.el4.noarch.rpm\nobjectweb-asm-3.1-5.3.1.jdk6.ep5.el4.noarch.rpm\nregexp-1.5-1.2.1.jdk6.ep5.el4.noarch.rpm\nstruts12-1.2.9-3.ep5.el4.noarch.rpm\ntomcat-jkstatus-ant-1.2.31-2.ep5.el4.noarch.rpm\ntomcat5-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-admin-webapps-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-common-lib-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-jasper-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-jasper-eclipse-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-jasper-javadoc-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-jsp-2.0-api-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-jsp-2.0-api-javadoc-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-parent-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-server-lib-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-servlet-2.4-api-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-servlet-2.4-api-javadoc-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-webapps-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat6-6.0.32-15_patch_03.ep5.el4.noarch.rpm\ntomcat6-admin-webapps-6.0.32-15_patch_03.ep5.el4.noarch.rpm\ntomcat6-docs-webapp-6.0.32-15_patch_03.ep5.el4.noarch.rpm\ntomcat6-el-1.0-api-6.0.32-15_patch_03.ep5.el4.noarch.rpm\ntomcat6-javadoc-6.0.32-15_patch_03.ep5.el4.noarch.rpm\ntomcat6-jsp-2.1-api-6.0.32-15_patch_03.ep5.el4.noarch.rpm\ntomcat6-lib-6.0.32-15_patch_03.ep5.el4.noarch.rpm\ntomcat6-log4j-6.0.32-15_patch_03.ep5.el4.noarch.rpm\ntomcat6-servlet-2.5-api-6.0.32-15_patch_03.ep5.el4.noarch.rpm\ntomcat6-webapps-6.0.32-15_patch_03.ep5.el4.noarch.rpm\nxalan-j2-2.7.1-5.3_patch_04.ep5.el4.noarch.rpm\nxerces-j2-2.9.1-3.patch01.1.ep5.el4.noarch.rpm\nxml-commons-1.3.04-7.12.ep5.el4.noarch.rpm\nxml-commons-jaxp-1.2-apis-1.3.04-7.12.ep5.el4.noarch.rpm\nxml-commons-jaxp-1.3-apis-1.3.04-7.12.ep5.el4.noarch.rpm\nxml-commons-resolver12-1.3.04-7.12.ep5.el4.noarch.rpm\n\nx86_64:\nhttpd22-2.2.17-14.ep5.el4.x86_64.rpm\nhttpd22-apr-2.2.17-14.ep5.el4.x86_64.rpm\nhttpd22-apr-devel-2.2.17-14.ep5.el4.x86_64.rpm\nhttpd22-apr-util-2.2.17-14.ep5.el4.x86_64.rpm\nhttpd22-apr-util-devel-2.2.17-14.ep5.el4.x86_64.rpm\nhttpd22-debuginfo-2.2.17-14.ep5.el4.x86_64.rpm\nhttpd22-devel-2.2.17-14.ep5.el4.x86_64.rpm\nhttpd22-manual-2.2.17-14.ep5.el4.x86_64.rpm\njakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el4.x86_64.rpm\njakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el4.x86_64.rpm\nmod_cluster-native-1.0.10-2.GA_CP01.ep5.el4.x86_64.rpm\nmod_cluster-native-debuginfo-1.0.10-2.GA_CP01.ep5.el4.x86_64.rpm\nmod_jk-ap20-1.2.31-1.ep5.el4.x86_64.rpm\nmod_jk-debuginfo-1.2.31-1.ep5.el4.x86_64.rpm\nmod_jk-manual-1.2.31-1.ep5.el4.x86_64.rpm\nmod_ssl22-2.2.17-14.ep5.el4.x86_64.rpm\ntomcat-native-1.1.20-2.0.ep5.el4.x86_64.rpm\ntomcat-native-debuginfo-1.1.20-2.0.ep5.el4.x86_64.rpm\n\nJBoss Enterprise Web Server 1.0 for RHEL 4 ES:\n\nSource:\nant-1.7.1-13.jdk6.ep5.el4.src.rpm\nantlr-2.7.7-7.ep5.el4.src.rpm\nbcel-5.2-8.1.ep5.el4.src.rpm\ncglib-2.2-5.1.1.jdk6.ep5.el4.src.rpm\ndom4j-1.6.1-11.ep5.el4.src.rpm\necj-3.3.1.1-3.2.2.jdk6.ep5.el4.src.rpm\nglassfish-jaf-1.1.0-6.1.1.jdk6.ep5.el4.src.rpm\nglassfish-javamail-1.4.2-0.4.ep5.el4.src.rpm\nglassfish-jsf-1.2_13-2.2.1.jdk6.ep5.el4.src.rpm\nhibernate3-3.3.2-1.5.GA_CP04.ep5.el4.src.rpm\nhibernate3-annotations-3.4.0-3.3.GA_CP04.ep5.el4.src.rpm\nhibernate3-commons-annotations-3.1.0-1.8.ep5.el4.src.rpm\nhibernate3-ejb-persistence-3.0-api-1.0.2-3.jdk6.ep5.el4.src.rpm\nhibernate3-entitymanager-3.4.0-4.3.GA_CP04.ep5.el4.src.rpm\nhttpd22-2.2.17-14.ep5.el4.src.rpm\njakarta-commons-beanutils-1.8.0-4.1.1.jdk6.ep5.el4.src.rpm\njakarta-commons-chain-1.2-2.2.ep5.el4.src.rpm\njakarta-commons-codec-1.3-9.1.1.jdk6.ep5.el4.src.rpm\njakarta-commons-collections-3.2.1-4.ep5.el4.src.rpm\njakarta-commons-daemon-1.0.5-1.ep5.el4.src.rpm\njakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el4.src.rpm\njakarta-commons-dbcp-1.2.1-16.4.ep5.el4.src.rpm\njakarta-commons-digester-1.8.1-8.1.jdk6.ep5.el4.src.rpm\njakarta-commons-el-1.0-19.2.jdk6.ep5.el4.src.rpm\njakarta-commons-fileupload-1.1.1-7.4.ep5.el4.src.rpm\njakarta-commons-httpclient-3.1-1.1.1.jdk6.ep5.el4.src.rpm\njakarta-commons-io-1.4-1.3.1.jdk6.ep5.el4.src.rpm\njakarta-commons-launcher-1.1-4.6.1.ep5.el4.src.rpm\njakarta-commons-logging-1.1.1-0.4.1.jdk6.ep5.el4.src.rpm\njakarta-commons-logging-jboss-1.1-10.2.1.jdk6.ep5.el4.src.rpm\njakarta-commons-modeler-2.0-4.ep5.el4.src.rpm\njakarta-commons-pool-1.3-11.2.1.jdk6.ep5.el4.src.rpm\njakarta-commons-validator-1.3.1-7.5.1.ep5.el4.src.rpm\njakarta-oro-2.0.8-3.3.2.1.jdk6.ep5.el4.src.rpm\njakarta-taglibs-standard-1.1.1-9.ep5.el4.src.rpm\njavassist-3.12.0-1.jdk6.ep5.el4.src.rpm\njboss-common-core-2.2.17-1.ep5.el4.src.rpm\njboss-common-logging-jdk-2.1.2-1.ep5.el4.src.rpm\njboss-common-logging-spi-2.1.2-1.ep5.el4.src.rpm\njboss-javaee-5.0.1-2.9.ep5.el4.src.rpm\njcommon-1.0.16-1.2.1.jdk6.ep5.el4.src.rpm\njfreechart-1.0.13-2.3.2.1.jdk6.ep5.el4.src.rpm\nlog4j-1.2.14-18.1.jdk6.ep5.el4.src.rpm\nmod_cluster-1.0.10-2.GA_CP01.ep5.el4.src.rpm\nmod_cluster-native-1.0.10-2.GA_CP01.ep5.el4.src.rpm\nmod_jk-1.2.31-1.ep5.el4.src.rpm\nmx4j-3.0.1-9.3.4.ep5.el4.src.rpm\nobjectweb-asm-3.1-5.3.1.jdk6.ep5.el4.src.rpm\nregexp-1.5-1.2.1.jdk6.ep5.el4.src.rpm\nstruts12-1.2.9-3.ep5.el4.src.rpm\ntomcat-jkstatus-ant-1.2.31-2.ep5.el4.src.rpm\ntomcat-native-1.1.20-2.0.ep5.el4.src.rpm\ntomcat5-5.5.33-14_patch_04.ep5.el4.src.rpm\ntomcat6-6.0.32-15_patch_03.ep5.el4.src.rpm\nxalan-j2-2.7.1-5.3_patch_04.ep5.el4.src.rpm\nxerces-j2-2.9.1-3.patch01.1.ep5.el4.src.rpm\nxml-commons-1.3.04-7.12.ep5.el4.src.rpm\n\ni386:\nhttpd22-2.2.17-14.ep5.el4.i386.rpm\nhttpd22-apr-2.2.17-14.ep5.el4.i386.rpm\nhttpd22-apr-devel-2.2.17-14.ep5.el4.i386.rpm\nhttpd22-apr-util-2.2.17-14.ep5.el4.i386.rpm\nhttpd22-apr-util-devel-2.2.17-14.ep5.el4.i386.rpm\nhttpd22-debuginfo-2.2.17-14.ep5.el4.i386.rpm\nhttpd22-devel-2.2.17-14.ep5.el4.i386.rpm\nhttpd22-manual-2.2.17-14.ep5.el4.i386.rpm\njakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el4.i386.rpm\njakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el4.i386.rpm\nmod_cluster-native-1.0.10-2.GA_CP01.ep5.el4.i386.rpm\nmod_cluster-native-debuginfo-1.0.10-2.GA_CP01.ep5.el4.i386.rpm\nmod_jk-ap20-1.2.31-1.ep5.el4.i386.rpm\nmod_jk-debuginfo-1.2.31-1.ep5.el4.i386.rpm\nmod_jk-manual-1.2.31-1.ep5.el4.i386.rpm\nmod_ssl22-2.2.17-14.ep5.el4.i386.rpm\ntomcat-native-1.1.20-2.0.ep5.el4.i386.rpm\ntomcat-native-debuginfo-1.1.20-2.0.ep5.el4.i386.rpm\n\nnoarch:\nant-1.7.1-13.jdk6.ep5.el4.noarch.rpm\nantlr-2.7.7-7.ep5.el4.noarch.rpm\nbcel-5.2-8.1.ep5.el4.noarch.rpm\ncglib-2.2-5.1.1.jdk6.ep5.el4.noarch.rpm\ndom4j-1.6.1-11.ep5.el4.noarch.rpm\necj-3.3.1.1-3.2.2.jdk6.ep5.el4.noarch.rpm\nglassfish-jaf-1.1.0-6.1.1.jdk6.ep5.el4.noarch.rpm\nglassfish-javamail-1.4.2-0.4.ep5.el4.noarch.rpm\nglassfish-jsf-1.2_13-2.2.1.jdk6.ep5.el4.noarch.rpm\nhibernate3-3.3.2-1.5.GA_CP04.ep5.el4.noarch.rpm\nhibernate3-annotations-3.4.0-3.3.GA_CP04.ep5.el4.noarch.rpm\nhibernate3-annotations-javadoc-3.4.0-3.3.GA_CP04.ep5.el4.noarch.rpm\nhibernate3-commons-annotations-3.1.0-1.8.ep5.el4.noarch.rpm\nhibernate3-commons-annotations-javadoc-3.1.0-1.8.ep5.el4.noarch.rpm\nhibernate3-ejb-persistence-3.0-api-1.0.2-3.jdk6.ep5.el4.noarch.rpm\nhibernate3-ejb-persistence-3.0-api-javadoc-1.0.2-3.jdk6.ep5.el4.noarch.rpm\nhibernate3-entitymanager-3.4.0-4.3.GA_CP04.ep5.el4.noarch.rpm\nhibernate3-entitymanager-javadoc-3.4.0-4.3.GA_CP04.ep5.el4.noarch.rpm\nhibernate3-javadoc-3.3.2-1.5.GA_CP04.ep5.el4.noarch.rpm\njakarta-commons-beanutils-1.8.0-4.1.1.jdk6.ep5.el4.noarch.rpm\njakarta-commons-chain-1.2-2.2.ep5.el4.noarch.rpm\njakarta-commons-codec-1.3-9.1.1.jdk6.ep5.el4.noarch.rpm\njakarta-commons-collections-3.2.1-4.ep5.el4.noarch.rpm\njakarta-commons-collections-tomcat5-3.2.1-4.ep5.el4.noarch.rpm\njakarta-commons-daemon-1.0.5-1.ep5.el4.noarch.rpm\njakarta-commons-dbcp-1.2.1-16.4.ep5.el4.noarch.rpm\njakarta-commons-dbcp-tomcat5-1.2.1-16.4.ep5.el4.noarch.rpm\njakarta-commons-digester-1.8.1-8.1.jdk6.ep5.el4.noarch.rpm\njakarta-commons-el-1.0-19.2.jdk6.ep5.el4.noarch.rpm\njakarta-commons-fileupload-1.1.1-7.4.ep5.el4.noarch.rpm\njakarta-commons-httpclient-3.1-1.1.1.jdk6.ep5.el4.noarch.rpm\njakarta-commons-io-1.4-1.3.1.jdk6.ep5.el4.noarch.rpm\njakarta-commons-launcher-1.1-4.6.1.ep5.el4.noarch.rpm\njakarta-commons-logging-1.1.1-0.4.1.jdk6.ep5.el4.noarch.rpm\njakarta-commons-logging-jboss-1.1-10.2.1.jdk6.ep5.el4.noarch.rpm\njakarta-commons-logging-tomcat6-1.1.1-0.4.1.jdk6.ep5.el4.noarch.rpm\njakarta-commons-modeler-2.0-4.ep5.el4.noarch.rpm\njakarta-commons-pool-1.3-11.2.1.jdk6.ep5.el4.noarch.rpm\njakarta-commons-pool-tomcat5-1.3-11.2.1.jdk6.ep5.el4.noarch.rpm\njakarta-commons-validator-1.3.1-7.5.1.ep5.el4.noarch.rpm\njakarta-oro-2.0.8-3.3.2.1.jdk6.ep5.el4.noarch.rpm\njakarta-taglibs-standard-1.1.1-9.ep5.el4.noarch.rpm\njavassist-3.12.0-1.jdk6.ep5.el4.noarch.rpm\njboss-common-core-2.2.17-1.ep5.el4.noarch.rpm\njboss-common-logging-jdk-2.1.2-1.ep5.el4.noarch.rpm\njboss-common-logging-spi-2.1.2-1.ep5.el4.noarch.rpm\njboss-javaee-poms-5.0.1-2.9.ep5.el4.noarch.rpm\njboss-jms-1.1-api-5.0.1-2.9.ep5.el4.noarch.rpm\njboss-transaction-1.0.1-api-5.0.1-2.9.ep5.el4.noarch.rpm\njcommon-1.0.16-1.2.1.jdk6.ep5.el4.noarch.rpm\njfreechart-1.0.13-2.3.2.1.jdk6.ep5.el4.noarch.rpm\nlog4j-1.2.14-18.1.jdk6.ep5.el4.noarch.rpm\nmod_cluster-demo-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm\nmod_cluster-jbossas-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm\nmod_cluster-jbossweb2-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm\nmod_cluster-tomcat6-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm\nmx4j-3.0.1-9.3.4.ep5.el4.noarch.rpm\nobjectweb-asm-3.1-5.3.1.jdk6.ep5.el4.noarch.rpm\nregexp-1.5-1.2.1.jdk6.ep5.el4.noarch.rpm\nstruts12-1.2.9-3.ep5.el4.noarch.rpm\ntomcat-jkstatus-ant-1.2.31-2.ep5.el4.noarch.rpm\ntomcat5-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-admin-webapps-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-common-lib-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-jasper-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-jasper-eclipse-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-jasper-javadoc-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-jsp-2.0-api-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-jsp-2.0-api-javadoc-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-parent-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-server-lib-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-servlet-2.4-api-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-servlet-2.4-api-javadoc-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat5-webapps-5.5.33-14_patch_04.ep5.el4.noarch.rpm\ntomcat6-6.0.32-15_patch_03.ep5.el4.noarch.rpm\ntomcat6-admin-webapps-6.0.32-15_patch_03.ep5.el4.noarch.rpm\ntomcat6-docs-webapp-6.0.32-15_patch_03.ep5.el4.noarch.rpm\ntomcat6-el-1.0-api-6.0.32-15_patch_03.ep5.el4.noarch.rpm\ntomcat6-javadoc-6.0.32-15_patch_03.ep5.el4.noarch.rpm\ntomcat6-jsp-2.1-api-6.0.32-15_patch_03.ep5.el4.noarch.rpm\ntomcat6-lib-6.0.32-15_patch_03.ep5.el4.noarch.rpm\ntomcat6-log4j-6.0.32-15_patch_03.ep5.el4.noarch.rpm\ntomcat6-servlet-2.5-api-6.0.32-15_patch_03.ep5.el4.noarch.rpm\ntomcat6-webapps-6.0.32-15_patch_03.ep5.el4.noarch.rpm\nxalan-j2-2.7.1-5.3_patch_04.ep5.el4.noarch.rpm\nxerces-j2-2.9.1-3.patch01.1.ep5.el4.noarch.rpm\nxml-commons-1.3.04-7.12.ep5.el4.noarch.rpm\nxml-commons-jaxp-1.2-apis-1.3.04-7.12.ep5.el4.noarch.rpm\nxml-commons-jaxp-1.3-apis-1.3.04-7.12.ep5.el4.noarch.rpm\nxml-commons-resolver12-1.3.04-7.12.ep5.el4.noarch.rpm\n\nx86_64:\nhttpd22-2.2.17-14.ep5.el4.x86_64.rpm\nhttpd22-apr-2.2.17-14.ep5.el4.x86_64.rpm\nhttpd22-apr-devel-2.2.17-14.ep5.el4.x86_64.rpm\nhttpd22-apr-util-2.2.17-14.ep5.el4.x86_64.rpm\nhttpd22-apr-util-devel-2.2.17-14.ep5.el4.x86_64.rpm\nhttpd22-debuginfo-2.2.17-14.ep5.el4.x86_64.rpm\nhttpd22-devel-2.2.17-14.ep5.el4.x86_64.rpm\nhttpd22-manual-2.2.17-14.ep5.el4.x86_64.rpm\njakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el4.x86_64.rpm\njakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el4.x86_64.rpm\nmod_cluster-native-1.0.10-2.GA_CP01.ep5.el4.x86_64.rpm\nmod_cluster-native-debuginfo-1.0.10-2.GA_CP01.ep5.el4.x86_64.rpm\nmod_jk-ap20-1.2.31-1.ep5.el4.x86_64.rpm\nmod_jk-debuginfo-1.2.31-1.ep5.el4.x86_64.rpm\nmod_jk-manual-1.2.31-1.ep5.el4.x86_64.rpm\nmod_ssl22-2.2.17-14.ep5.el4.x86_64.rpm\ntomcat-native-1.1.20-2.0.ep5.el4.x86_64.rpm\ntomcat-native-debuginfo-1.1.20-2.0.ep5.el4.x86_64.rpm\n\nJBoss Enterprise Web Server 1.0 for RHEL 5 Server:\n\nSource:\nant-1.7.1-13.jdk6.ep5.el5.src.rpm\nantlr-2.7.7-7.ep5.el5.src.rpm\ncglib-2.2-5.1.1.1.jdk6.ep5.el5.src.rpm\ndom4j-1.6.1-11.ep5.el5.src.rpm\necj3-3.3.1.1-3.1.1.1.jdk6.ep5.el5.src.rpm\nglassfish-jsf-1.2_13-3.1.1.jdk6.ep5.el5.src.rpm\nhibernate3-3.3.2-1.4.GA_CP04.ep5.el5.src.rpm\nhibernate3-annotations-3.4.0-3.2.GA_CP04.ep5.el5.src.rpm\nhibernate3-commons-annotations-3.1.0-1.8.ep5.el5.src.rpm\nhibernate3-ejb-persistence-3.0-api-1.0.2-3.1.jdk6.ep5.el5.src.rpm\nhibernate3-entitymanager-3.4.0-4.3.GA_CP04.ep5.el5.src.rpm\nhttpd-2.2.17-11.1.ep5.el5.src.rpm\njakarta-commons-beanutils-1.8.0-4.1.2.1.jdk6.ep5.el5.src.rpm\njakarta-commons-chain-1.2-2.2.1.ep5.el5.src.rpm\njakarta-commons-codec-1.3-9.2.1.1.jdk6.ep5.el5.src.rpm\njakarta-commons-collections-3.2.1-4.1.ep5.el5.src.rpm\njakarta-commons-daemon-1.0.5-1.ep5.el5.src.rpm\njakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el5.src.rpm\njakarta-commons-dbcp-1.2.1-16.4.ep5.el5.src.rpm\njakarta-commons-digester-1.8.1-8.1.jdk6.ep5.el5.src.rpm\njakarta-commons-fileupload-1.1.1-7.4.ep5.el5.src.rpm\njakarta-commons-httpclient-3.1-1.2.1.jdk6.ep5.el5.src.rpm\njakarta-commons-io-1.4-1.3.1.jdk6.ep5.el5.src.rpm\njakarta-commons-logging-1.1.1-0.4.1.jdk6.ep5.el5.src.rpm\njakarta-commons-logging-jboss-1.1-10.2.1.jdk6.ep5.el5.src.rpm\njakarta-commons-pool-1.3-11.2.1.jdk6.ep5.el5.src.rpm\njakarta-commons-validator-1.3.1-7.5.2.ep5.el5.src.rpm\njakarta-oro-2.0.8-3.3.2.1.1.1.jdk6.ep5.el5.src.rpm\njakarta-taglibs-standard-1.1.1-9.1.ep5.el5.src.rpm\njavassist-3.12.0-1.jdk6.ep5.el5.src.rpm\njboss-common-core-2.2.17-1.ep5.el5.src.rpm\njboss-common-logging-jdk-2.1.2-1.ep5.el5.src.rpm\njboss-common-logging-spi-2.1.2-1.ep5.el5.src.rpm\njboss-javaee-5.0.1-2.9.ep5.el5.src.rpm\njcommon-1.0.16-1.2.1.jdk6.ep5.el5.src.rpm\njfreechart-1.0.13-2.3.2.1.jdk6.ep5.el5.src.rpm\nmod_cluster-1.0.10-2.1.GA_CP01.ep5.el5.src.rpm\nmod_cluster-native-1.0.10-2.1.GA_CP01.ep5.el5.src.rpm\nmod_jk-1.2.31-1.1.ep5.el5.src.rpm\nobjectweb-asm-3.1-5.3.1.jdk6.ep5.el5.src.rpm\nstruts12-1.2.9-3.1.ep5.el5.src.rpm\ntomcat-jkstatus-ant-1.2.31-2.ep5.el5.src.rpm\ntomcat-native-1.1.20-2.1.ep5.el5.src.rpm\ntomcat5-5.5.33-16_patch_04.ep5.el5.src.rpm\ntomcat6-6.0.32-15.1_patch_03.ep5.el5.src.rpm\nxalan-j2-2.7.1-5.3_patch_04.ep5.el5.src.rpm\nxerces-j2-2.9.1-3.patch01.1.ep5.el5.src.rpm\nxml-commons-1.3.04-7.10.jdk6.ep5.el5.src.rpm\n\ni386:\nhttpd-2.2.17-11.1.ep5.el5.i386.rpm\nhttpd-debuginfo-2.2.17-11.1.ep5.el5.i386.rpm\nhttpd-devel-2.2.17-11.1.ep5.el5.i386.rpm\nhttpd-manual-2.2.17-11.1.ep5.el5.i386.rpm\njakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el5.i386.rpm\njakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el5.i386.rpm\nmod_cluster-native-1.0.10-2.1.GA_CP01.ep5.el5.i386.rpm\nmod_cluster-native-debuginfo-1.0.10-2.1.GA_CP01.ep5.el5.i386.rpm\nmod_jk-ap20-1.2.31-1.1.ep5.el5.i386.rpm\nmod_jk-debuginfo-1.2.31-1.1.ep5.el5.i386.rpm\nmod_jk-manual-1.2.31-1.1.ep5.el5.i386.rpm\nmod_ssl-2.2.17-11.1.ep5.el5.i386.rpm\ntomcat-native-1.1.20-2.1.ep5.el5.i386.rpm\ntomcat-native-debuginfo-1.1.20-2.1.ep5.el5.i386.rpm\n\nnoarch:\nant-1.7.1-13.jdk6.ep5.el5.noarch.rpm\nant-antlr-1.7.1-13.jdk6.ep5.el5.noarch.rpm\nant-apache-bcel-1.7.1-13.jdk6.ep5.el5.noarch.rpm\nant-apache-bsf-1.7.1-13.jdk6.ep5.el5.noarch.rpm\nant-apache-log4j-1.7.1-13.jdk6.ep5.el5.noarch.rpm\nant-apache-oro-1.7.1-13.jdk6.ep5.el5.noarch.rpm\nant-apache-regexp-1.7.1-13.jdk6.ep5.el5.noarch.rpm\nant-apache-resolver-1.7.1-13.jdk6.ep5.el5.noarch.rpm\nant-commons-logging-1.7.1-13.jdk6.ep5.el5.noarch.rpm\nant-javamail-1.7.1-13.jdk6.ep5.el5.noarch.rpm\nant-jdepend-1.7.1-13.jdk6.ep5.el5.noarch.rpm\nant-jmf-1.7.1-13.jdk6.ep5.el5.noarch.rpm\nant-jsch-1.7.1-13.jdk6.ep5.el5.noarch.rpm\nant-junit-1.7.1-13.jdk6.ep5.el5.noarch.rpm\nant-nodeps-1.7.1-13.jdk6.ep5.el5.noarch.rpm\nant-scripts-1.7.1-13.jdk6.ep5.el5.noarch.rpm\nant-swing-1.7.1-13.jdk6.ep5.el5.noarch.rpm\nant-trax-1.7.1-13.jdk6.ep5.el5.noarch.rpm\nantlr-2.7.7-7.ep5.el5.noarch.rpm\ncglib-2.2-5.1.1.1.jdk6.ep5.el5.noarch.rpm\ndom4j-1.6.1-11.ep5.el5.noarch.rpm\necj3-3.3.1.1-3.1.1.1.jdk6.ep5.el5.noarch.rpm\nglassfish-jsf-1.2_13-3.1.1.jdk6.ep5.el5.noarch.rpm\nhibernate3-3.3.2-1.4.GA_CP04.ep5.el5.noarch.rpm\nhibernate3-annotations-3.4.0-3.2.GA_CP04.ep5.el5.noarch.rpm\nhibernate3-annotations-javadoc-3.4.0-3.2.GA_CP04.ep5.el5.noarch.rpm\nhibernate3-commons-annotations-3.1.0-1.8.ep5.el5.noarch.rpm\nhibernate3-commons-annotations-javadoc-3.1.0-1.8.ep5.el5.noarch.rpm\nhibernate3-ejb-persistence-3.0-api-1.0.2-3.1.jdk6.ep5.el5.noarch.rpm\nhibernate3-ejb-persistence-3.0-api-javadoc-1.0.2-3.1.jdk6.ep5.el5.noarch.rpm\nhibernate3-entitymanager-3.4.0-4.3.GA_CP04.ep5.el5.noarch.rpm\nhibernate3-entitymanager-javadoc-3.4.0-4.3.GA_CP04.ep5.el5.noarch.rpm\nhibernate3-javadoc-3.3.2-1.4.GA_CP04.ep5.el5.noarch.rpm\njakarta-commons-beanutils-1.8.0-4.1.2.1.jdk6.ep5.el5.noarch.rpm\njakarta-commons-chain-1.2-2.2.1.ep5.el5.noarch.rpm\njakarta-commons-codec-1.3-9.2.1.1.jdk6.ep5.el5.noarch.rpm\njakarta-commons-collections-3.2.1-4.1.ep5.el5.noarch.rpm\njakarta-commons-collections-tomcat5-3.2.1-4.1.ep5.el5.noarch.rpm\njakarta-commons-daemon-1.0.5-1.ep5.el5.noarch.rpm\njakarta-commons-dbcp-1.2.1-16.4.ep5.el5.noarch.rpm\njakarta-commons-dbcp-tomcat5-1.2.1-16.4.ep5.el5.noarch.rpm\njakarta-commons-digester-1.8.1-8.1.jdk6.ep5.el5.noarch.rpm\njakarta-commons-fileupload-1.1.1-7.4.ep5.el5.noarch.rpm\njakarta-commons-httpclient-3.1-1.2.1.jdk6.ep5.el5.noarch.rpm\njakarta-commons-io-1.4-1.3.1.jdk6.ep5.el5.noarch.rpm\njakarta-commons-logging-1.1.1-0.4.1.jdk6.ep5.el5.noarch.rpm\njakarta-commons-logging-jboss-1.1-10.2.1.jdk6.ep5.el5.noarch.rpm\njakarta-commons-logging-tomcat6-1.1.1-0.4.1.jdk6.ep5.el5.noarch.rpm\njakarta-commons-pool-1.3-11.2.1.jdk6.ep5.el5.noarch.rpm\njakarta-commons-pool-tomcat5-1.3-11.2.1.jdk6.ep5.el5.noarch.rpm\njakarta-commons-validator-1.3.1-7.5.2.ep5.el5.noarch.rpm\njakarta-oro-2.0.8-3.3.2.1.1.1.jdk6.ep5.el5.noarch.rpm\njakarta-taglibs-standard-1.1.1-9.1.ep5.el5.noarch.rpm\njavassist-3.12.0-1.jdk6.ep5.el5.noarch.rpm\njboss-common-core-2.2.17-1.ep5.el5.noarch.rpm\njboss-common-logging-jdk-2.1.2-1.ep5.el5.noarch.rpm\njboss-common-logging-spi-2.1.2-1.ep5.el5.noarch.rpm\njboss-javaee-5.0.1-2.9.ep5.el5.noarch.rpm\njboss-javaee-poms-5.0.1-2.9.ep5.el5.noarch.rpm\njboss-jms-1.1-api-5.0.1-2.9.ep5.el5.noarch.rpm\njboss-transaction-1.0.1-api-5.0.1-2.9.ep5.el5.noarch.rpm\njcommon-1.0.16-1.2.1.jdk6.ep5.el5.noarch.rpm\njfreechart-1.0.13-2.3.2.1.jdk6.ep5.el5.noarch.rpm\nmod_cluster-demo-1.0.10-2.1.GA_CP01.ep5.el5.noarch.rpm\nmod_cluster-jbossas-1.0.10-2.1.GA_CP01.ep5.el5.noarch.rpm\nmod_cluster-jbossweb2-1.0.10-2.1.GA_CP01.ep5.el5.noarch.rpm\nmod_cluster-tomcat6-1.0.10-2.1.GA_CP01.ep5.el5.noarch.rpm\nobjectweb-asm-3.1-5.3.1.jdk6.ep5.el5.noarch.rpm\nstruts12-1.2.9-3.1.ep5.el5.noarch.rpm\ntomcat-jkstatus-ant-1.2.31-2.ep5.el5.noarch.rpm\ntomcat5-5.5.33-16_patch_04.ep5.el5.noarch.rpm\ntomcat5-admin-webapps-5.5.33-16_patch_04.ep5.el5.noarch.rpm\ntomcat5-common-lib-5.5.33-16_patch_04.ep5.el5.noarch.rpm\ntomcat5-jasper-5.5.33-16_patch_04.ep5.el5.noarch.rpm\ntomcat5-jasper-eclipse-5.5.33-16_patch_04.ep5.el5.noarch.rpm\ntomcat5-jasper-javadoc-5.5.33-16_patch_04.ep5.el5.noarch.rpm\ntomcat5-jsp-2.0-api-5.5.33-16_patch_04.ep5.el5.noarch.rpm\ntomcat5-jsp-2.0-api-javadoc-5.5.33-16_patch_04.ep5.el5.noarch.rpm\ntomcat5-parent-5.5.33-16_patch_04.ep5.el5.noarch.rpm\ntomcat5-server-lib-5.5.33-16_patch_04.ep5.el5.noarch.rpm\ntomcat5-servlet-2.4-api-5.5.33-16_patch_04.ep5.el5.noarch.rpm\ntomcat5-servlet-2.4-api-javadoc-5.5.33-16_patch_04.ep5.el5.noarch.rpm\ntomcat5-webapps-5.5.33-16_patch_04.ep5.el5.noarch.rpm\ntomcat6-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm\ntomcat6-admin-webapps-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm\ntomcat6-docs-webapp-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm\ntomcat6-el-1.0-api-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm\ntomcat6-javadoc-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm\ntomcat6-jsp-2.1-api-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm\ntomcat6-lib-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm\ntomcat6-log4j-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm\ntomcat6-servlet-2.5-api-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm\ntomcat6-webapps-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm\nxalan-j2-2.7.1-5.3_patch_04.ep5.el5.noarch.rpm\nxerces-j2-2.9.1-3.patch01.1.ep5.el5.noarch.rpm\nxml-commons-1.3.04-7.10.jdk6.ep5.el5.noarch.rpm\nxml-commons-jaxp-1.2-apis-1.3.04-7.10.jdk6.ep5.el5.noarch.rpm\nxml-commons-jaxp-1.3-apis-1.3.04-7.10.jdk6.ep5.el5.noarch.rpm\nxml-commons-resolver12-1.3.04-7.10.jdk6.ep5.el5.noarch.rpm\n\nx86_64:\nhttpd-2.2.17-11.1.ep5.el5.x86_64.rpm\nhttpd-debuginfo-2.2.17-11.1.ep5.el5.x86_64.rpm\nhttpd-devel-2.2.17-11.1.ep5.el5.x86_64.rpm\nhttpd-manual-2.2.17-11.1.ep5.el5.x86_64.rpm\njakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el5.x86_64.rpm\njakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el5.x86_64.rpm\nmod_cluster-native-1.0.10-2.1.GA_CP01.ep5.el5.x86_64.rpm\nmod_cluster-native-debuginfo-1.0.10-2.1.GA_CP01.ep5.el5.x86_64.rpm\nmod_jk-ap20-1.2.31-1.1.ep5.el5.x86_64.rpm\nmod_jk-debuginfo-1.2.31-1.1.ep5.el5.x86_64.rpm\nmod_jk-manual-1.2.31-1.1.ep5.el5.x86_64.rpm\nmod_ssl-2.2.17-11.1.ep5.el5.x86_64.rpm\ntomcat-native-1.1.20-2.1.ep5.el5.x86_64.rpm\ntomcat-native-debuginfo-1.1.20-2.1.ep5.el5.x86_64.rpm\n\nJBoss Enterprise Web Server 1.0 for RHEL 6 Server:\n\nSource:\nant-1.7.1-14.ep5.el6.src.rpm\nantlr-2.7.7-7.ep5.el6.src.rpm\ncglib-2.2-5.4.ep5.el6.src.rpm\ndom4j-1.6.1-11.1.ep5.el6.src.rpm\necj3-3.3.1.1-4.ep5.el6.src.rpm\nglassfish-jsf-1.2_13-3.1.4.ep5.el6.src.rpm\nhibernate3-3.3.2-1.8.GA_CP04.ep5.el6.src.rpm\nhibernate3-annotations-3.4.0-3.5.GA_CP04.ep5.el6.src.rpm\nhibernate3-commons-annotations-3.1.0-1.8.ep5.el6.src.rpm\nhibernate3-ejb-persistence-3.0-api-1.0.2-3.3.ep5.el6.src.rpm\nhibernate3-entitymanager-3.4.0-4.4.GA_CP04.ep5.el6.src.rpm\nhttpd-2.2.17-11.2.ep5.el6.src.rpm\njakarta-commons-beanutils-1.8.0-9.ep5.el6.src.rpm\njakarta-commons-chain-1.2-2.2.2.ep5.el6.src.rpm\njakarta-commons-codec-1.3-12.1.ep5.el6.src.rpm\njakarta-commons-collections-3.2.1-4.ep5.el6.src.rpm\njakarta-commons-daemon-1.0.5-1.1.ep5.el6.src.rpm\njakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el6.src.rpm\njakarta-commons-dbcp-1.2.1-16.2.ep5.el6.src.rpm\njakarta-commons-digester-1.8.1-8.1.1.1.ep5.el6.src.rpm\njakarta-commons-fileupload-1.1.1-7.5.ep5.el6.src.rpm\njakarta-commons-httpclient-3.1-1.2.2.ep5.el6.src.rpm\njakarta-commons-io-1.4-4.ep5.el6.src.rpm\njakarta-commons-logging-1.1.1-1.ep5.el6.src.rpm\njakarta-commons-logging-jboss-1.1-10.2.2.1.ep5.el6.src.rpm\njakarta-commons-pool-1.3-15.ep5.el6.src.rpm\njakarta-commons-validator-1.3.1-7.5.2.ep5.el6.src.rpm\njakarta-oro-2.0.8-7.ep5.el6.src.rpm\njakarta-taglibs-standard-1.1.1-12.ep5.el6.src.rpm\njavassist-3.12.0-3.ep5.el6.src.rpm\njboss-common-core-2.2.17-1.2.ep5.el6.src.rpm\njboss-common-logging-jdk-2.1.2-1.2.ep5.el6.src.rpm\njboss-common-logging-spi-2.1.2-1.ep5.el6.src.rpm\njboss-javaee-5.0.1-2.9.ep5.el6.src.rpm\njcommon-1.0.16-1.2.2.ep5.el6.src.rpm\njfreechart-1.0.13-2.3.2.1.2.ep5.el6.src.rpm\nmod_cluster-1.0.10-2.2.GA_CP01.ep5.el6.src.rpm\nmod_cluster-native-1.0.10-2.1.1.GA_CP01.ep5.el6.src.rpm\nmod_jk-1.2.31-1.1.2.ep5.el6.src.rpm\nobjectweb-asm31-3.1-12.1.ep5.el6.src.rpm\nstruts12-1.2.9-3.1.ep5.el6.src.rpm\ntomcat-jkstatus-ant-1.2.31-2.1.ep5.el6.src.rpm\ntomcat-native-1.1.20-2.1.2.ep5.el6.src.rpm\ntomcat5-5.5.33-15_patch_04.ep5.el6.src.rpm\ntomcat6-6.0.32-14_patch_03.ep5.el6.src.rpm\nxalan-j2-2.7.1-5.3_patch_04.ep5.el6.src.rpm\nxerces-j2-2.9.1-8.patch01.1.ep5.el6.src.rpm\nxml-commons-1.3.04-7.14.ep5.el6.src.rpm\n\ni386:\nhttpd-2.2.17-11.2.ep5.el6.i386.rpm\nhttpd-debuginfo-2.2.17-11.2.ep5.el6.i386.rpm\nhttpd-devel-2.2.17-11.2.ep5.el6.i386.rpm\nhttpd-manual-2.2.17-11.2.ep5.el6.i386.rpm\nhttpd-tools-2.2.17-11.2.ep5.el6.i386.rpm\njakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el6.i386.rpm\njakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el6.i386.rpm\nmod_cluster-native-1.0.10-2.1.1.GA_CP01.ep5.el6.i386.rpm\nmod_cluster-native-debuginfo-1.0.10-2.1.1.GA_CP01.ep5.el6.i386.rpm\nmod_jk-ap20-1.2.31-1.1.2.ep5.el6.i386.rpm\nmod_jk-debuginfo-1.2.31-1.1.2.ep5.el6.i386.rpm\nmod_jk-manual-1.2.31-1.1.2.ep5.el6.i386.rpm\nmod_ssl-2.2.17-11.2.ep5.el6.i386.rpm\ntomcat-native-1.1.20-2.1.2.ep5.el6.i386.rpm\ntomcat-native-debuginfo-1.1.20-2.1.2.ep5.el6.i386.rpm\n\nnoarch:\nant-1.7.1-14.ep5.el6.noarch.rpm\nant-antlr-1.7.1-14.ep5.el6.noarch.rpm\nant-apache-bcel-1.7.1-14.ep5.el6.noarch.rpm\nant-apache-bsf-1.7.1-14.ep5.el6.noarch.rpm\nant-apache-log4j-1.7.1-14.ep5.el6.noarch.rpm\nant-apache-oro-1.7.1-14.ep5.el6.noarch.rpm\nant-apache-regexp-1.7.1-14.ep5.el6.noarch.rpm\nant-apache-resolver-1.7.1-14.ep5.el6.noarch.rpm\nant-commons-logging-1.7.1-14.ep5.el6.noarch.rpm\nant-commons-net-1.7.1-14.ep5.el6.noarch.rpm\nant-javamail-1.7.1-14.ep5.el6.noarch.rpm\nant-jdepend-1.7.1-14.ep5.el6.noarch.rpm\nant-jmf-1.7.1-14.ep5.el6.noarch.rpm\nant-jsch-1.7.1-14.ep5.el6.noarch.rpm\nant-junit-1.7.1-14.ep5.el6.noarch.rpm\nant-nodeps-1.7.1-14.ep5.el6.noarch.rpm\nant-scripts-1.7.1-14.ep5.el6.noarch.rpm\nant-swing-1.7.1-14.ep5.el6.noarch.rpm\nant-trax-1.7.1-14.ep5.el6.noarch.rpm\nantlr-2.7.7-7.ep5.el6.noarch.rpm\ncglib-2.2-5.4.ep5.el6.noarch.rpm\ndom4j-1.6.1-11.1.ep5.el6.noarch.rpm\necj3-3.3.1.1-4.ep5.el6.noarch.rpm\nglassfish-jsf-1.2_13-3.1.4.ep5.el6.noarch.rpm\nhibernate3-3.3.2-1.8.GA_CP04.ep5.el6.noarch.rpm\nhibernate3-annotations-3.4.0-3.5.GA_CP04.ep5.el6.noarch.rpm\nhibernate3-annotations-javadoc-3.4.0-3.5.GA_CP04.ep5.el6.noarch.rpm\nhibernate3-commons-annotations-3.1.0-1.8.ep5.el6.noarch.rpm\nhibernate3-commons-annotations-javadoc-3.1.0-1.8.ep5.el6.noarch.rpm\nhibernate3-ejb-persistence-3.0-api-1.0.2-3.3.ep5.el6.noarch.rpm\nhibernate3-ejb-persistence-3.0-api-javadoc-1.0.2-3.3.ep5.el6.noarch.rpm\nhibernate3-entitymanager-3.4.0-4.4.GA_CP04.ep5.el6.noarch.rpm\nhibernate3-entitymanager-javadoc-3.4.0-4.4.GA_CP04.ep5.el6.noarch.rpm\nhibernate3-javadoc-3.3.2-1.8.GA_CP04.ep5.el6.noarch.rpm\njakarta-commons-beanutils-1.8.0-9.ep5.el6.noarch.rpm\njakarta-commons-chain-1.2-2.2.2.ep5.el6.noarch.rpm\njakarta-commons-codec-1.3-12.1.ep5.el6.noarch.rpm\njakarta-commons-collections-3.2.1-4.ep5.el6.noarch.rpm\njakarta-commons-collections-tomcat5-3.2.1-4.ep5.el6.noarch.rpm\njakarta-commons-daemon-1.0.5-1.1.ep5.el6.noarch.rpm\njakarta-commons-dbcp-1.2.1-16.2.ep5.el6.noarch.rpm\njakarta-commons-dbcp-tomcat5-1.2.1-16.2.ep5.el6.noarch.rpm\njakarta-commons-digester-1.8.1-8.1.1.1.ep5.el6.noarch.rpm\njakarta-commons-fileupload-1.1.1-7.5.ep5.el6.noarch.rpm\njakarta-commons-httpclient-3.1-1.2.2.ep5.el6.noarch.rpm\njakarta-commons-io-1.4-4.ep5.el6.noarch.rpm\njakarta-commons-logging-1.1.1-1.ep5.el6.noarch.rpm\njakarta-commons-logging-jboss-1.1-10.2.2.1.ep5.el6.noarch.rpm\njakarta-commons-logging-tomcat6-1.1.1-1.ep5.el6.noarch.rpm\njakarta-commons-pool-1.3-15.ep5.el6.noarch.rpm\njakarta-commons-pool-tomcat5-1.3-15.ep5.el6.noarch.rpm\njakarta-commons-validator-1.3.1-7.5.2.ep5.el6.noarch.rpm\njakarta-oro-2.0.8-7.ep5.el6.noarch.rpm\njakarta-taglibs-standard-1.1.1-12.ep5.el6.noarch.rpm\njavassist-3.12.0-3.ep5.el6.noarch.rpm\njboss-common-core-2.2.17-1.2.ep5.el6.noarch.rpm\njboss-common-logging-jdk-2.1.2-1.2.ep5.el6.noarch.rpm\njboss-common-logging-spi-2.1.2-1.ep5.el6.noarch.rpm\njboss-javaee-5.0.1-2.9.ep5.el6.noarch.rpm\njboss-javaee-poms-5.0.1-2.9.ep5.el6.noarch.rpm\njboss-jms-1.1-api-5.0.1-2.9.ep5.el6.noarch.rpm\njboss-transaction-1.0.1-api-5.0.1-2.9.ep5.el6.noarch.rpm\njcommon-1.0.16-1.2.2.ep5.el6.noarch.rpm\njfreechart-1.0.13-2.3.2.1.2.ep5.el6.noarch.rpm\nmod_cluster-demo-1.0.10-2.2.GA_CP01.ep5.el6.noarch.rpm\nmod_cluster-jbossas-1.0.10-2.2.GA_CP01.ep5.el6.noarch.rpm\nmod_cluster-jbossweb2-1.0.10-2.2.GA_CP01.ep5.el6.noarch.rpm\nmod_cluster-tomcat6-1.0.10-2.2.GA_CP01.ep5.el6.noarch.rpm\nobjectweb-asm31-3.1-12.1.ep5.el6.noarch.rpm\nstruts12-1.2.9-3.1.ep5.el6.noarch.rpm\ntomcat-jkstatus-ant-1.2.31-2.1.ep5.el6.noarch.rpm\ntomcat5-5.5.33-15_patch_04.ep5.el6.noarch.rpm\ntomcat5-admin-webapps-5.5.33-15_patch_04.ep5.el6.noarch.rpm\ntomcat5-common-lib-5.5.33-15_patch_04.ep5.el6.noarch.rpm\ntomcat5-jasper-5.5.33-15_patch_04.ep5.el6.noarch.rpm\ntomcat5-jasper-eclipse-5.5.33-15_patch_04.ep5.el6.noarch.rpm\ntomcat5-jasper-javadoc-5.5.33-15_patch_04.ep5.el6.noarch.rpm\ntomcat5-jsp-2.0-api-5.5.33-15_patch_04.ep5.el6.noarch.rpm\ntomcat5-jsp-2.0-api-javadoc-5.5.33-15_patch_04.ep5.el6.noarch.rpm\ntomcat5-parent-5.5.33-15_patch_04.ep5.el6.noarch.rpm\ntomcat5-server-lib-5.5.33-15_patch_04.ep5.el6.noarch.rpm\ntomcat5-servlet-2.4-api-5.5.33-15_patch_04.ep5.el6.noarch.rpm\ntomcat5-servlet-2.4-api-javadoc-5.5.33-15_patch_04.ep5.el6.noarch.rpm\ntomcat5-webapps-5.5.33-15_patch_04.ep5.el6.noarch.rpm\ntomcat6-6.0.32-14_patch_03.ep5.el6.noarch.rpm\ntomcat6-admin-webapps-6.0.32-14_patch_03.ep5.el6.noarch.rpm\ntomcat6-docs-webapp-6.0.32-14_patch_03.ep5.el6.noarch.rpm\ntomcat6-el-1.0-api-6.0.32-14_patch_03.ep5.el6.noarch.rpm\ntomcat6-javadoc-6.0.32-14_patch_03.ep5.el6.noarch.rpm\ntomcat6-jsp-2.1-api-6.0.32-14_patch_03.ep5.el6.noarch.rpm\ntomcat6-lib-6.0.32-14_patch_03.ep5.el6.noarch.rpm\ntomcat6-log4j-6.0.32-14_patch_03.ep5.el6.noarch.rpm\ntomcat6-servlet-2.5-api-6.0.32-14_patch_03.ep5.el6.noarch.rpm\ntomcat6-webapps-6.0.32-14_patch_03.ep5.el6.noarch.rpm\nxalan-j2-2.7.1-5.3_patch_04.ep5.el6.noarch.rpm\nxerces-j2-2.9.1-8.patch01.1.ep5.el6.noarch.rpm\nxml-commons-1.3.04-7.14.ep5.el6.noarch.rpm\nxml-commons-jaxp-1.1-apis-1.3.04-7.14.ep5.el6.noarch.rpm\nxml-commons-jaxp-1.2-apis-1.3.04-7.14.ep5.el6.noarch.rpm\nxml-commons-jaxp-1.3-apis-1.3.04-7.14.ep5.el6.noarch.rpm\nxml-commons-resolver10-1.3.04-7.14.ep5.el6.noarch.rpm\nxml-commons-resolver11-1.3.04-7.14.ep5.el6.noarch.rpm\nxml-commons-resolver12-1.3.04-7.14.ep5.el6.noarch.rpm\nxml-commons-which10-1.3.04-7.14.ep5.el6.noarch.rpm\nxml-commons-which11-1.3.04-7.14.ep5.el6.noarch.rpm\n\nx86_64:\nhttpd-2.2.17-11.2.ep5.el6.x86_64.rpm\nhttpd-debuginfo-2.2.17-11.2.ep5.el6.x86_64.rpm\nhttpd-devel-2.2.17-11.2.ep5.el6.x86_64.rpm\nhttpd-manual-2.2.17-11.2.ep5.el6.x86_64.rpm\nhttpd-tools-2.2.17-11.2.ep5.el6.x86_64.rpm\njakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el6.x86_64.rpm\njakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el6.x86_64.rpm\nmod_cluster-native-1.0.10-2.1.1.GA_CP01.ep5.el6.x86_64.rpm\nmod_cluster-native-debuginfo-1.0.10-2.1.1.GA_CP01.ep5.el6.x86_64.rpm\nmod_jk-ap20-1.2.31-1.1.2.ep5.el6.x86_64.rpm\nmod_jk-debuginfo-1.2.31-1.1.2.ep5.el6.x86_64.rpm\nmod_jk-manual-1.2.31-1.1.2.ep5.el6.x86_64.rpm\nmod_ssl-2.2.17-11.2.ep5.el6.x86_64.rpm\ntomcat-native-1.1.20-2.1.2.ep5.el6.x86_64.rpm\ntomcat-native-debuginfo-1.1.20-2.1.2.ep5.el6.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and \ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2010-1157.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-1452.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-1623.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3718.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-4172.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-0013.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-0419.html\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttp://docs.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0/html-single/Release_Notes_1.0.2/index.html\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2011 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFOAubvXlSAg2UNWIIRApW6AJ4kvQ3q2boy3UntDB/XSHBuOmN02QCgmLaj\nNXAWrqe0nO3HRh9R1bnYZR0=\n=YW2z\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2011-0419"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001638"
},
{
"db": "VULHUB",
"id": "VHN-48364"
},
{
"db": "PACKETSTORM",
"id": "101599"
},
{
"db": "PACKETSTORM",
"id": "104936"
},
{
"db": "PACKETSTORM",
"id": "112043"
},
{
"db": "PACKETSTORM",
"id": "101667"
},
{
"db": "PACKETSTORM",
"id": "106415"
},
{
"db": "PACKETSTORM",
"id": "106416"
},
{
"db": "PACKETSTORM",
"id": "102549"
}
],
"trust": 2.34
},
"exploit_availability": {
"_id": null,
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-48364",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-48364"
}
]
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2011-0419",
"trust": 3.2
},
{
"db": "SECUNIA",
"id": "44564",
"trust": 2.5
},
{
"db": "SECUNIA",
"id": "44490",
"trust": 2.5
},
{
"db": "SECTRACK",
"id": "1025527",
"trust": 2.5
},
{
"db": "SECUNIA",
"id": "44574",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "48308",
"trust": 1.7
},
{
"db": "SREASON",
"id": "8246",
"trust": 1.7
},
{
"db": "BID",
"id": "47820",
"trust": 0.9
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001638",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201105-160",
"trust": 0.7
},
{
"db": "PACKETSTORM",
"id": "104936",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "106416",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "106415",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "101599",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "101667",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "101408",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "105356",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "106557",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "117251",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "104969",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "101435",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "101611",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "101383",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "105422",
"trust": 0.1
},
{
"db": "EXPLOIT-DB",
"id": "35738",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-48364",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "112043",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "102549",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-48364"
},
{
"db": "PACKETSTORM",
"id": "101599"
},
{
"db": "PACKETSTORM",
"id": "104936"
},
{
"db": "PACKETSTORM",
"id": "112043"
},
{
"db": "PACKETSTORM",
"id": "101667"
},
{
"db": "PACKETSTORM",
"id": "106415"
},
{
"db": "PACKETSTORM",
"id": "106416"
},
{
"db": "PACKETSTORM",
"id": "102549"
},
{
"db": "CNNVD",
"id": "CNNVD-201105-160"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001638"
},
{
"db": "NVD",
"id": "CVE-2011-0419"
}
]
},
"id": "VAR-201105-0121",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-48364"
}
],
"trust": 0.01
},
"last_update_date": "2026-03-09T21:01:11.648000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.android.com/"
},
{
"title": "Fixed in Apache httpd 2.2.18",
"trust": 0.8,
"url": "http://httpd.apache.org/security/vulnerabilities_22.html#2.2.18-dev"
},
{
"title": "Apache Portable Runtime 1.4.4 and Apache Portable Runtime Utility 1.3.11 Released",
"trust": 0.8,
"url": "http://www.apache.org/dist/apr/Announcement1.x.html"
},
{
"title": "Apache HTTP Server 2.2.18 Released",
"trust": 0.8,
"url": "http://www.apache.org/dist/httpd/Announcement2.2.html"
},
{
"title": "CHANGES-APR-1.4",
"trust": 0.8,
"url": "http://www.apache.org/dist/apr/CHANGES-APR-1.4"
},
{
"title": "1098188",
"trust": 0.8,
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1098188"
},
{
"title": "apr-1.2.7-11.AXS3.4",
"trust": 0.8,
"url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=1431"
},
{
"title": "Top Page",
"trust": 0.8,
"url": "http://security.freebsd.org"
},
{
"title": "HS11-011",
"trust": 0.8,
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-011/index.html"
},
{
"title": "HPSBUX02702",
"trust": 0.8,
"url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02997184"
},
{
"title": "HPSBOV02822 SSRT100966",
"trust": 0.8,
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03517954"
},
{
"title": "7008517",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27008517#61039"
},
{
"title": "7021867",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27021867#8001"
},
{
"title": "PM38826",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM38826"
},
{
"title": "7022958",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27022958#8001"
},
{
"title": "2216",
"trust": 0.8,
"url": "https://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=2216"
},
{
"title": "2218",
"trust": 0.8,
"url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=2218"
},
{
"title": "Announcing NetBSD 5.1",
"trust": 0.8,
"url": "http://www.netbsd.org/releases/formal-5/NetBSD-5.1.html"
},
{
"title": "The OpenBSD\uff0f4.8 Release",
"trust": 0.8,
"url": "http://openbsd.org/48.html"
},
{
"title": "Text Form of Oracle Critical Patch Update - July 2013 Risk Matrices",
"trust": 0.8,
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2013verbose-1899830.html"
},
{
"title": "Oracle Critical Patch Update Advisory - July 2012",
"trust": 0.8,
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html"
},
{
"title": "Text Form of Oracle Critical Patch Update - July 2012 Risk Matrices",
"trust": 0.8,
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2012verbose-392736.html"
},
{
"title": "Oracle Critical Patch Update Advisory - July 2013",
"trust": 0.8,
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html"
},
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.oracle.com/jp/index.html"
},
{
"title": "RHSA-2011:0507",
"trust": 0.8,
"url": "https://rhn.redhat.com/errata/RHSA-2011-0507.html"
},
{
"title": "July 2013 Critical Patch Update Released",
"trust": 0.8,
"url": "https://blogs.oracle.com/security/entry/july_2013_critical_patch_update"
},
{
"title": "CVE-2011-0419 Denial of Service (DoS) vulnerability in Solaris C Library",
"trust": 0.8,
"url": "https://blogs.oracle.com/sunsecurity/entry/cve_2011_0419_denial_of"
},
{
"title": "Multiple vulnerabilities in Apache HTTP Server",
"trust": 0.8,
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_apache_http"
},
{
"title": "July 2012 Critical Patch Update Released",
"trust": 0.8,
"url": "https://blogs.oracle.com/security/entry/july_2012_critical_patch_update"
},
{
"title": "TLSA-2011-21",
"trust": 0.8,
"url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-21j.txt"
},
{
"title": "Mac OS \u30b5\u30fc\u30d3\u30b9\u304a\u3088\u3073\u30b5\u30dd\u30fc\u30c8",
"trust": 0.8,
"url": "http://www.apple.com/jp/support/osfamily"
},
{
"title": "HS11-011",
"trust": 0.8,
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS11-011/index.html"
},
{
"title": "Interstage HTTP Server: 2\u4ef6\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8106\u5f31\u6027",
"trust": 0.8,
"url": "http://software.fujitsu.com/jp/security/products-fujitsu/solution/interstage_as_201104.html"
},
{
"title": "apr-1.4.6-win32-src",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=44947"
},
{
"title": "httpd-2.2.23",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=44946"
}
],
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201105-160"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001638"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-770",
"trust": 1.0
},
{
"problemtype": "CWE-399",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-48364"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001638"
},
{
"db": "NVD",
"id": "CVE-2011-0419"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.5,
"url": "http://secunia.com/advisories/44490"
},
{
"trust": 2.5,
"url": "http://secunia.com/advisories/44564"
},
{
"trust": 1.7,
"url": "http://lists.apple.com/archives/security-announce/2011//oct/msg00003.html"
},
{
"trust": 1.7,
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/fnmatch.c#rev1.22"
},
{
"trust": 1.7,
"url": "http://support.apple.com/kb/ht5002"
},
{
"trust": 1.7,
"url": "http://www.apache.org/dist/apr/announcement1.x.html"
},
{
"trust": 1.7,
"url": "http://www.apache.org/dist/apr/changes-apr-1.4"
},
{
"trust": 1.7,
"url": "http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fnmatch.c#rev1.15"
},
{
"trust": 1.7,
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html"
},
{
"trust": 1.7,
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html"
},
{
"trust": 1.7,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=703390"
},
{
"trust": 1.7,
"url": "http://www.debian.org/security/2011/dsa-2237"
},
{
"trust": 1.7,
"url": "http://www.mandriva.com/security/advisories?name=mdvsa-2011:084"
},
{
"trust": 1.7,
"url": "http://www.mandriva.com/security/advisories?name=mdvsa-2013:150"
},
{
"trust": 1.7,
"url": "http://cxib.net/stuff/apache.fnmatch.phps"
},
{
"trust": 1.7,
"url": "http://cxib.net/stuff/apr_fnmatch.txts"
},
{
"trust": 1.7,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a14638"
},
{
"trust": 1.7,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a14804"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/support/errata/rhsa-2011-0507.html"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/support/errata/rhsa-2011-0896.html"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/support/errata/rhsa-2011-0897.html"
},
{
"trust": 1.7,
"url": "http://securitytracker.com/id?1025527"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/44574"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/48308"
},
{
"trust": 1.7,
"url": "http://securityreason.com/securityalert/8246"
},
{
"trust": 1.7,
"url": "http://securityreason.com/achievement_securityalert/98"
},
{
"trust": 1.7,
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.html"
},
{
"trust": 1.6,
"url": "http://marc.info/?l=bugtraq\u0026m=131731002122529\u0026w=2"
},
{
"trust": 1.6,
"url": "http://marc.info/?l=bugtraq\u0026m=131551295528105\u0026w=2"
},
{
"trust": 1.6,
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1098188"
},
{
"trust": 1.6,
"url": "http://svn.apache.org/viewvc/apr/apr/branches/1.4.x/strings/apr_fnmatch.c?r1=731029\u0026r2=1098902"
},
{
"trust": 1.6,
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1098799"
},
{
"trust": 1.6,
"url": "http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2"
},
{
"trust": 1.6,
"url": "http://marc.info/?l=bugtraq\u0026m=132033751509019\u0026w=2"
},
{
"trust": 1.1,
"url": "http://httpd.apache.org/security/vulnerabilities_22.html"
},
{
"trust": 1.1,
"url": "http://www.apache.org/dist/httpd/announcement2.2.html"
},
{
"trust": 1.0,
"url": "http://www.mail-archive.com/dev%40apr.apache.org/msg23976.html"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "http://www.mail-archive.com/dev%40apr.apache.org/msg23961.html"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "http://www.mail-archive.com/dev%40apr.apache.org/msg23960.html"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0419"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0419"
},
{
"trust": 0.8,
"url": "http://www.securityfocus.com/bid/47820"
},
{
"trust": 0.8,
"url": "http://www.securitytracker.com/id?1025527"
},
{
"trust": 0.7,
"url": "http://www.mail-archive.com/dev@apr.apache.org/msg23961.html"
},
{
"trust": 0.7,
"url": "http://www.mail-archive.com/dev@apr.apache.org/msg23960.html"
},
{
"trust": 0.7,
"url": "http://www.mail-archive.com/dev@apr.apache.org/msg23976.html"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-0419"
},
{
"trust": 0.6,
"url": "httpd.apache.org%3e"
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3ccvs."
},
{
"trust": 0.6,
"url": "httpd.apache.org/security/vulnerabilities_22.html"
},
{
"trust": 0.6,
"url": "httpd/announcement2.2.html"
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3ccvs."
},
{
"trust": 0.4,
"url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins"
},
{
"trust": 0.4,
"url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c02964430"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3192"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1928"
},
{
"trust": 0.3,
"url": "https://www.hp.com/go/swa"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-1623"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-1452"
},
{
"trust": 0.2,
"url": "https://h20392.www2.hp.com/portal/swdepot/try.do?productnumber=hpuxwsatw319"
},
{
"trust": 0.1,
"url": "http://svn.apache.org/viewvc/apr/apr/branches/1.4.x/strings/apr_fnmatch.c?r1=731029\u0026amp;r2=1098902"
},
{
"trust": 0.1,
"url": "http://svn.apache.org/viewvc?view=revision\u0026amp;revision=1098188"
},
{
"trust": 0.1,
"url": "http://svn.apache.org/viewvc?view=revision\u0026amp;revision=1098799"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=132033751509019\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=134987041210674\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=131551295528105\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=131731002122529\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.1,
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.1,
"url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.1,
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.1,
"url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.1,
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.1,
"url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.1,
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.1,
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.1,
"url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.1,
"url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.1,
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.1,
"url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.1,
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.1,
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.1,
"url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.1,
"url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.1,
"url": "https://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f@%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.1,
"url": "https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6@%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.1,
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.1,
"url": "http://secunia.com/"
},
{
"trust": 0.1,
"url": "http://www.debian.org/security/faq"
},
{
"trust": 0.1,
"url": "http://www.debian.org/security/"
},
{
"trust": 0.1,
"url": "http://lists.grok.org.uk/full-disclosure-charter.html"
},
{
"trust": 0.1,
"url": "http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3c20110826103531.998348f82@minotaur.apache.org%3e"
},
{
"trust": 0.1,
"url": "https://ftp.usa.hp.com/hprc/home"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-4409"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1468"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1148"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3182"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1467"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1471"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-0734"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1470"
},
{
"trust": 0.1,
"url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2202"
},
{
"trust": 0.1,
"url": "http://h18000.www1.hp.com/products/servers/management/agents/index.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-4645"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1945"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-2068"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1938"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-3436"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2483"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-0014"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1464"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1153"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-0195"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-0037"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2192"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-2791"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3189"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/apr/1.4.2-7ubuntu2.1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/apache2/2.0.55-4ubuntu2.13"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/apr/1.3.8-1ubuntu0.3"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/apr/1.4.2-3ubuntu1.1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/apr/1.2.11-1ubuntu0.2"
},
{
"trust": 0.1,
"url": "https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber=hpuxwsatw234"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3348"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/kb/docs/doc-11259"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2010-3718.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-3718"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2010-1623.html"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2010-1157.html"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2011-0013.html"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2010-4172.html"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/team/contact/"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2011-0419.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-4172"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"trust": 0.1,
"url": "https://rhn.redhat.com/errata/rhsa-2011-0897.html"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2010-1452.html"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/team/key/#package"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-0013"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-1157"
},
{
"trust": 0.1,
"url": "http://bugzilla.redhat.com/):"
},
{
"trust": 0.1,
"url": "http://docs.redhat.com/docs/en-us/jboss_enterprise_web_server/1.0/html-single/release_notes_1.0.2/index.html"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-48364"
},
{
"db": "PACKETSTORM",
"id": "101599"
},
{
"db": "PACKETSTORM",
"id": "104936"
},
{
"db": "PACKETSTORM",
"id": "112043"
},
{
"db": "PACKETSTORM",
"id": "101667"
},
{
"db": "PACKETSTORM",
"id": "106415"
},
{
"db": "PACKETSTORM",
"id": "106416"
},
{
"db": "PACKETSTORM",
"id": "102549"
},
{
"db": "CNNVD",
"id": "CNNVD-201105-160"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001638"
},
{
"db": "NVD",
"id": "CVE-2011-0419"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "VULHUB",
"id": "VHN-48364",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "101599",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "104936",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "112043",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "101667",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "106415",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "106416",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "102549",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201105-160",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001638",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2011-0419",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2011-05-16T00:00:00",
"db": "VULHUB",
"id": "VHN-48364",
"ident": null
},
{
"date": "2011-05-21T14:45:49",
"db": "PACKETSTORM",
"id": "101599",
"ident": null
},
{
"date": "2011-09-09T05:23:01",
"db": "PACKETSTORM",
"id": "104936",
"ident": null
},
{
"date": "2012-04-20T20:15:33",
"db": "PACKETSTORM",
"id": "112043",
"ident": null
},
{
"date": "2011-05-25T05:53:12",
"db": "PACKETSTORM",
"id": "101667",
"ident": null
},
{
"date": "2011-10-29T12:12:00",
"db": "PACKETSTORM",
"id": "106415",
"ident": null
},
{
"date": "2011-10-29T12:14:00",
"db": "PACKETSTORM",
"id": "106416",
"ident": null
},
{
"date": "2011-06-24T09:10:50",
"db": "PACKETSTORM",
"id": "102549",
"ident": null
},
{
"date": "2011-05-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201105-160",
"ident": null
},
{
"date": "2011-05-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-001638",
"ident": null
},
{
"date": "2011-05-16T17:55:02.387000",
"db": "NVD",
"id": "CVE-2011-0419",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2018-01-06T00:00:00",
"db": "VULHUB",
"id": "VHN-48364",
"ident": null
},
{
"date": "2022-09-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201105-160",
"ident": null
},
{
"date": "2015-04-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-001638",
"ident": null
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2011-0419",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "PACKETSTORM",
"id": "101667"
},
{
"db": "CNNVD",
"id": "CNNVD-201105-160"
}
],
"trust": 0.7
},
"title": {
"_id": null,
"data": "Apache Portable Runtime Used in products such as libraries apr_fnmatch.c and fnmatch.c Service disruption in (CPU And memory consumption ) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-001638"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201105-160"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.