RHSA-2021:4861
Vulnerability from csaf_redhat
Published
2021-11-30 14:28
Modified
2025-02-07 05:31
Summary
Red Hat Security Advisory: Red Hat JBoss Web Server 5.6.0 Security release

Notes

Topic
Updated Red Hat JBoss Web Server 5.6.0 packages are now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8. Red Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library. This release of Red Hat JBoss Web Server 5.6.0 serves as a replacement for Red Hat JBoss Web Server 5.5.0. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References. Security Fix(es): * tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS (CVE-2021-42340) * tomcat: HTTP request smuggling when used with a reverse proxy (CVE-2021-33037) * tomcat: JNDI realm authentication weakness (CVE-2021-30640) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
   document: {
      aggregate_severity: {
         namespace: "https://access.redhat.com/security/updates/classification/",
         text: "Important",
      },
      category: "csaf_security_advisory",
      csaf_version: "2.0",
      distribution: {
         text: "Copyright © Red Hat, Inc. All rights reserved.",
         tlp: {
            label: "WHITE",
            url: "https://www.first.org/tlp/",
         },
      },
      lang: "en",
      notes: [
         {
            category: "summary",
            text: "Updated Red Hat JBoss Web Server 5.6.0 packages are now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
            title: "Topic",
         },
         {
            category: "general",
            text: "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 5.6.0 serves as a replacement for Red Hat JBoss Web Server 5.5.0. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References.\n\nSecurity Fix(es):\n\n* tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS (CVE-2021-42340)\n* tomcat: HTTP request smuggling when used with a reverse proxy (CVE-2021-33037)\n* tomcat: JNDI realm authentication weakness (CVE-2021-30640)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
            title: "Details",
         },
         {
            category: "legal_disclaimer",
            text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
            title: "Terms of Use",
         },
      ],
      publisher: {
         category: "vendor",
         contact_details: "https://access.redhat.com/security/team/contact/",
         issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
         name: "Red Hat Product Security",
         namespace: "https://www.redhat.com",
      },
      references: [
         {
            category: "self",
            summary: "https://access.redhat.com/errata/RHSA-2021:4861",
            url: "https://access.redhat.com/errata/RHSA-2021:4861",
         },
         {
            category: "external",
            summary: "https://access.redhat.com/security/updates/classification/#important",
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            category: "external",
            summary: "1981533",
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1981533",
         },
         {
            category: "external",
            summary: "1981544",
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1981544",
         },
         {
            category: "external",
            summary: "2014356",
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014356",
         },
         {
            category: "self",
            summary: "Canonical URL",
            url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4861.json",
         },
      ],
      title: "Red Hat Security Advisory: Red Hat JBoss Web Server 5.6.0 Security release",
      tracking: {
         current_release_date: "2025-02-07T05:31:22+00:00",
         generator: {
            date: "2025-02-07T05:31:22+00:00",
            engine: {
               name: "Red Hat SDEngine",
               version: "4.3.0",
            },
         },
         id: "RHSA-2021:4861",
         initial_release_date: "2021-11-30T14:28:36+00:00",
         revision_history: [
            {
               date: "2021-11-30T14:28:36+00:00",
               number: "1",
               summary: "Initial version",
            },
            {
               date: "2021-11-30T14:28:36+00:00",
               number: "2",
               summary: "Last updated version",
            },
            {
               date: "2025-02-07T05:31:22+00:00",
               number: "3",
               summary: "Last generated version",
            },
         ],
         status: "final",
         version: "3",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  branches: [
                     {
                        category: "product_name",
                        name: "Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
                        product: {
                           name: "Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
                           product_id: "7Server-JWS-5.6",
                           product_identification_helper: {
                              cpe: "cpe:/a:redhat:jboss_enterprise_web_server:5.6::el7",
                           },
                        },
                     },
                     {
                        category: "product_name",
                        name: "Red Hat JBoss Web Server 5.6 for RHEL 8",
                        product: {
                           name: "Red Hat JBoss Web Server 5.6 for RHEL 8",
                           product_id: "8Base-JWS-5.6",
                           product_identification_helper: {
                              cpe: "cpe:/a:redhat:jboss_enterprise_web_server:5.6::el8",
                           },
                        },
                     },
                  ],
                  category: "product_family",
                  name: "Red Hat JBoss Web Server",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
                        product: {
                           name: "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
                           product_id: "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat@9.0.50-3.redhat_00004.1.el7jws?arch=src",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
                        product: {
                           name: "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
                           product_id: "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-native@1.2.30-3.redhat_3.el7jws?arch=src",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
                        product: {
                           name: "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
                           product_id: "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-vault@1.1.8-4.Final_redhat_00004.1.el7jws?arch=src",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
                        product: {
                           name: "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
                           product_id: "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat@9.0.50-3.redhat_00004.1.el8jws?arch=src",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
                        product: {
                           name: "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
                           product_id: "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-native@1.2.30-3.redhat_3.el8jws?arch=src",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
                        product: {
                           name: "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
                           product_id: "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-vault@1.1.8-4.Final_redhat_00004.1.el8jws?arch=src",
                           },
                        },
                     },
                  ],
                  category: "architecture",
                  name: "src",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                        product: {
                           name: "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_id: "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat@9.0.50-3.redhat_00004.1.el7jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                        product: {
                           name: "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_id: "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-admin-webapps@9.0.50-3.redhat_00004.1.el7jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                        product: {
                           name: "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_id: "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-docs-webapp@9.0.50-3.redhat_00004.1.el7jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                        product: {
                           name: "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_id: "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-el-3.0-api@9.0.50-3.redhat_00004.1.el7jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                        product: {
                           name: "jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_id: "jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-java-jdk11@9.0.50-3.redhat_00004.1.el7jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                        product: {
                           name: "jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_id: "jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-java-jdk8@9.0.50-3.redhat_00004.1.el7jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                        product: {
                           name: "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_id: "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-javadoc@9.0.50-3.redhat_00004.1.el7jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                        product: {
                           name: "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_id: "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-jsp-2.3-api@9.0.50-3.redhat_00004.1.el7jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                        product: {
                           name: "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_id: "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-lib@9.0.50-3.redhat_00004.1.el7jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                        product: {
                           name: "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_id: "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-selinux@9.0.50-3.redhat_00004.1.el7jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                        product: {
                           name: "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_id: "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-servlet-4.0-api@9.0.50-3.redhat_00004.1.el7jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                        product: {
                           name: "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_id: "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-webapps@9.0.50-3.redhat_00004.1.el7jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                        product: {
                           name: "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                           product_id: "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-vault@1.1.8-4.Final_redhat_00004.1.el7jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                        product: {
                           name: "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                           product_id: "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-vault-javadoc@1.1.8-4.Final_redhat_00004.1.el7jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                        product: {
                           name: "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                           product_id: "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat@9.0.50-3.redhat_00004.1.el8jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                        product: {
                           name: "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                           product_id: "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-admin-webapps@9.0.50-3.redhat_00004.1.el8jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                        product: {
                           name: "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                           product_id: "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-docs-webapp@9.0.50-3.redhat_00004.1.el8jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                        product: {
                           name: "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                           product_id: "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-el-3.0-api@9.0.50-3.redhat_00004.1.el8jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                        product: {
                           name: "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                           product_id: "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-javadoc@9.0.50-3.redhat_00004.1.el8jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                        product: {
                           name: "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                           product_id: "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-jsp-2.3-api@9.0.50-3.redhat_00004.1.el8jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                        product: {
                           name: "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                           product_id: "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-lib@9.0.50-3.redhat_00004.1.el8jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                        product: {
                           name: "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                           product_id: "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-selinux@9.0.50-3.redhat_00004.1.el8jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                        product: {
                           name: "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                           product_id: "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-servlet-4.0-api@9.0.50-3.redhat_00004.1.el8jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                        product: {
                           name: "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                           product_id: "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-webapps@9.0.50-3.redhat_00004.1.el8jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                        product: {
                           name: "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                           product_id: "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-vault@1.1.8-4.Final_redhat_00004.1.el8jws?arch=noarch",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                        product: {
                           name: "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                           product_id: "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-vault-javadoc@1.1.8-4.Final_redhat_00004.1.el8jws?arch=noarch",
                           },
                        },
                     },
                  ],
                  category: "architecture",
                  name: "noarch",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
                        product: {
                           name: "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
                           product_id: "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-native@1.2.30-3.redhat_3.el7jws?arch=x86_64",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
                        product: {
                           name: "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
                           product_id: "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-native-debuginfo@1.2.30-3.redhat_3.el7jws?arch=x86_64",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
                        product: {
                           name: "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
                           product_id: "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-native@1.2.30-3.redhat_3.el8jws?arch=x86_64",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
                        product: {
                           name: "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
                           product_id: "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/jws5-tomcat-native-debuginfo@1.2.30-3.redhat_3.el8jws?arch=x86_64",
                           },
                        },
                     },
                  ],
                  category: "architecture",
                  name: "x86_64",
               },
            ],
            category: "vendor",
            name: "Red Hat",
         },
      ],
      relationships: [
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
               product_id: "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            },
            product_reference: "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            relates_to_product_reference: "7Server-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
               product_id: "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
            },
            product_reference: "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
            relates_to_product_reference: "7Server-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
               product_id: "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            },
            product_reference: "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            relates_to_product_reference: "7Server-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
               product_id: "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            },
            product_reference: "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            relates_to_product_reference: "7Server-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
               product_id: "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            },
            product_reference: "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            relates_to_product_reference: "7Server-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
               product_id: "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            },
            product_reference: "jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            relates_to_product_reference: "7Server-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
               product_id: "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            },
            product_reference: "jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            relates_to_product_reference: "7Server-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
               product_id: "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            },
            product_reference: "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            relates_to_product_reference: "7Server-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
               product_id: "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            },
            product_reference: "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            relates_to_product_reference: "7Server-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
               product_id: "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            },
            product_reference: "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            relates_to_product_reference: "7Server-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
               product_id: "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
            },
            product_reference: "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
            relates_to_product_reference: "7Server-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64 as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
               product_id: "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
            },
            product_reference: "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
            relates_to_product_reference: "7Server-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64 as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
               product_id: "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
            },
            product_reference: "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
            relates_to_product_reference: "7Server-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
               product_id: "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            },
            product_reference: "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            relates_to_product_reference: "7Server-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
               product_id: "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            },
            product_reference: "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            relates_to_product_reference: "7Server-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
               product_id: "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            },
            product_reference: "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            relates_to_product_reference: "7Server-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
               product_id: "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
            },
            product_reference: "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
            relates_to_product_reference: "7Server-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
               product_id: "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            },
            product_reference: "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            relates_to_product_reference: "7Server-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
               product_id: "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            },
            product_reference: "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            relates_to_product_reference: "7Server-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
               product_id: "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            },
            product_reference: "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            relates_to_product_reference: "8Base-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
               product_id: "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
            },
            product_reference: "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
            relates_to_product_reference: "8Base-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
               product_id: "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            },
            product_reference: "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            relates_to_product_reference: "8Base-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
               product_id: "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            },
            product_reference: "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            relates_to_product_reference: "8Base-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
               product_id: "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            },
            product_reference: "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            relates_to_product_reference: "8Base-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
               product_id: "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            },
            product_reference: "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            relates_to_product_reference: "8Base-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
               product_id: "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            },
            product_reference: "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            relates_to_product_reference: "8Base-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
               product_id: "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            },
            product_reference: "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            relates_to_product_reference: "8Base-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
               product_id: "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
            },
            product_reference: "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
            relates_to_product_reference: "8Base-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64 as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
               product_id: "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
            },
            product_reference: "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
            relates_to_product_reference: "8Base-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64 as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
               product_id: "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
            },
            product_reference: "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
            relates_to_product_reference: "8Base-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
               product_id: "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            },
            product_reference: "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            relates_to_product_reference: "8Base-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
               product_id: "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            },
            product_reference: "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            relates_to_product_reference: "8Base-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
               product_id: "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            },
            product_reference: "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            relates_to_product_reference: "8Base-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
               product_id: "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
            },
            product_reference: "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
            relates_to_product_reference: "8Base-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
               product_id: "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            },
            product_reference: "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            relates_to_product_reference: "8Base-JWS-5.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
               product_id: "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            },
            product_reference: "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            relates_to_product_reference: "8Base-JWS-5.6",
         },
      ],
   },
   vulnerabilities: [
      {
         acknowledgments: [
            {
               names: [
                  "the OpenSSL project",
               ],
               organization: "Ingo Schwarze",
               summary: "Acknowledged by upstream.",
            },
         ],
         cve: "CVE-2021-3712",
         cwe: {
            id: "CWE-125",
            name: "Out-of-bounds Read",
         },
         discovery_date: "2021-08-19T00:00:00+00:00",
         ids: [
            {
               system_name: "Red Hat Bugzilla ID",
               text: "1995634",
            },
         ],
         notes: [
            {
               category: "description",
               text: "It was found that openssl assumed ASN.1 strings to be NUL terminated. A malicious actor may be able to force an application into calling openssl function with a specially crafted, non-NUL terminated string to deliberately hit this bug, which may result in a crash of the application, causing a Denial of Service attack, or possibly, memory disclosure. The highest threat from this vulnerability is to data confidentiality and system availability.",
               title: "Vulnerability description",
            },
            {
               category: "summary",
               text: "openssl: Read buffer overruns processing ASN.1 strings",
               title: "Vulnerability summary",
            },
            {
               category: "other",
               text: "The following Red Hat products do not ship the affected OpenSSL component but rely on the Red Hat Enterprise Linux to consume them:\n * Red Hat Satellite\n * Red Hat Update Infrastructure\n * Red Hat CloudForms\n\nThe Red Hat Advanced Cluster Management for Kubernetes is using the vulnerable version of the library, however the vulnerable code path is not reachable.",
               title: "Statement",
            },
            {
               category: "general",
               text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
               title: "CVSS score applicability",
            },
         ],
         product_status: {
            fixed: [
               "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
               "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
               "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
               "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
               "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
               "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
               "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
               "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
               "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
               "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
               "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            ],
         },
         references: [
            {
               category: "self",
               summary: "Canonical URL",
               url: "https://access.redhat.com/security/cve/CVE-2021-3712",
            },
            {
               category: "external",
               summary: "RHBZ#1995634",
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=1995634",
            },
            {
               category: "external",
               summary: "https://www.cve.org/CVERecord?id=CVE-2021-3712",
               url: "https://www.cve.org/CVERecord?id=CVE-2021-3712",
            },
            {
               category: "external",
               summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3712",
               url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3712",
            },
            {
               category: "external",
               summary: "https://www.openssl.org/news/secadv/20210824.txt",
               url: "https://www.openssl.org/news/secadv/20210824.txt",
            },
         ],
         release_date: "2021-08-24T00:00:00+00:00",
         remediations: [
            {
               category: "vendor_fix",
               date: "2021-11-30T14:28:36+00:00",
               details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
               product_ids: [
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               ],
               restart_required: {
                  category: "none",
               },
               url: "https://access.redhat.com/errata/RHSA-2021:4861",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.4,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               details: "Moderate",
            },
         ],
         title: "openssl: Read buffer overruns processing ASN.1 strings",
      },
      {
         cve: "CVE-2021-23840",
         cwe: {
            id: "CWE-190",
            name: "Integer Overflow or Wraparound",
         },
         discovery_date: "2021-02-09T00:00:00+00:00",
         ids: [
            {
               system_name: "Red Hat Bugzilla ID",
               text: "1930324",
            },
         ],
         notes: [
            {
               category: "description",
               text: "Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissible length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash.",
               title: "Vulnerability description",
            },
            {
               category: "summary",
               text: "openssl: integer overflow in CipherUpdate",
               title: "Vulnerability summary",
            },
            {
               category: "other",
               text: "This flaw only affects applications which are compiled with OpenSSL and using  EVP_CipherUpdate, EVP_EncryptUpdate or EVP_DecryptUpdate functions. When specially-crafted values are passed to these functions, it can cause the application to crash or behave incorrectly.\n\nOpenSSL in Red Hat Enterprise Linux 9 was marked as not affected as its already fixed in RHEL9 Alpha release.",
               title: "Statement",
            },
            {
               category: "general",
               text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
               title: "CVSS score applicability",
            },
         ],
         product_status: {
            fixed: [
               "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
               "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
               "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
               "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
               "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
               "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
               "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
               "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
               "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
               "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
               "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            ],
         },
         references: [
            {
               category: "self",
               summary: "Canonical URL",
               url: "https://access.redhat.com/security/cve/CVE-2021-23840",
            },
            {
               category: "external",
               summary: "RHBZ#1930324",
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=1930324",
            },
            {
               category: "external",
               summary: "https://www.cve.org/CVERecord?id=CVE-2021-23840",
               url: "https://www.cve.org/CVERecord?id=CVE-2021-23840",
            },
            {
               category: "external",
               summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23840",
               url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23840",
            },
            {
               category: "external",
               summary: "https://www.openssl.org/news/secadv/20210216.txt",
               url: "https://www.openssl.org/news/secadv/20210216.txt",
            },
         ],
         release_date: "2021-02-16T00:00:00+00:00",
         remediations: [
            {
               category: "vendor_fix",
               date: "2021-11-30T14:28:36+00:00",
               details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
               product_ids: [
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               ],
               restart_required: {
                  category: "none",
               },
               url: "https://access.redhat.com/errata/RHSA-2021:4861",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               details: "Low",
            },
         ],
         title: "openssl: integer overflow in CipherUpdate",
      },
      {
         cve: "CVE-2021-23841",
         cwe: {
            id: "CWE-476",
            name: "NULL Pointer Dereference",
         },
         discovery_date: "2021-02-16T00:00:00+00:00",
         ids: [
            {
               system_name: "Red Hat Bugzilla ID",
               text: "1930310",
            },
         ],
         notes: [
            {
               category: "description",
               text: "The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack.",
               title: "Vulnerability description",
            },
            {
               category: "summary",
               text: "openssl: NULL pointer dereference in X509_issuer_and_serial_hash()",
               title: "Vulnerability summary",
            },
            {
               category: "other",
               text: "This is a a null pointer dereference in the X509_issuer_and_serial_hash()  function, which can result in crash if called by an application compiled with OpenSSL, by passing a specially-crafted certificate. OpenSSL internally does not use this function.",
               title: "Statement",
            },
            {
               category: "general",
               text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
               title: "CVSS score applicability",
            },
         ],
         product_status: {
            fixed: [
               "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
               "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
               "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
               "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
               "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
               "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
               "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
               "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
               "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
               "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
               "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            ],
         },
         references: [
            {
               category: "self",
               summary: "Canonical URL",
               url: "https://access.redhat.com/security/cve/CVE-2021-23841",
            },
            {
               category: "external",
               summary: "RHBZ#1930310",
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=1930310",
            },
            {
               category: "external",
               summary: "https://www.cve.org/CVERecord?id=CVE-2021-23841",
               url: "https://www.cve.org/CVERecord?id=CVE-2021-23841",
            },
            {
               category: "external",
               summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23841",
               url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23841",
            },
            {
               category: "external",
               summary: "https://www.openssl.org/news/secadv/20210216.txt",
               url: "https://www.openssl.org/news/secadv/20210216.txt",
            },
         ],
         release_date: "2021-02-16T00:00:00+00:00",
         remediations: [
            {
               category: "vendor_fix",
               date: "2021-11-30T14:28:36+00:00",
               details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
               product_ids: [
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               ],
               restart_required: {
                  category: "none",
               },
               url: "https://access.redhat.com/errata/RHSA-2021:4861",
            },
            {
               category: "workaround",
               details: "As per upstream \"The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources.\"",
               product_ids: [
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               details: "Moderate",
            },
         ],
         title: "openssl: NULL pointer dereference in X509_issuer_and_serial_hash()",
      },
      {
         cve: "CVE-2021-30640",
         cwe: {
            id: "CWE-287",
            name: "Improper Authentication",
         },
         discovery_date: "2021-07-12T00:00:00+00:00",
         ids: [
            {
               system_name: "Red Hat Bugzilla ID",
               text: "1981544",
            },
         ],
         notes: [
            {
               category: "description",
               text: "A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.",
               title: "Vulnerability description",
            },
            {
               category: "summary",
               text: "tomcat: JNDI realm authentication weakness",
               title: "Vulnerability summary",
            },
            {
               category: "other",
               text: "Red Hat OpenStack Platform's OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.",
               title: "Statement",
            },
            {
               category: "general",
               text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
               title: "CVSS score applicability",
            },
         ],
         product_status: {
            fixed: [
               "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
               "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
               "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
               "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
               "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
               "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
               "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
               "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
               "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
               "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
               "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            ],
         },
         references: [
            {
               category: "self",
               summary: "Canonical URL",
               url: "https://access.redhat.com/security/cve/CVE-2021-30640",
            },
            {
               category: "external",
               summary: "RHBZ#1981544",
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=1981544",
            },
            {
               category: "external",
               summary: "https://www.cve.org/CVERecord?id=CVE-2021-30640",
               url: "https://www.cve.org/CVERecord?id=CVE-2021-30640",
            },
            {
               category: "external",
               summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-30640",
               url: "https://nvd.nist.gov/vuln/detail/CVE-2021-30640",
            },
         ],
         release_date: "2021-07-12T00:00:00+00:00",
         remediations: [
            {
               category: "vendor_fix",
               date: "2021-11-30T14:28:36+00:00",
               details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
               product_ids: [
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               ],
               restart_required: {
                  category: "none",
               },
               url: "https://access.redhat.com/errata/RHSA-2021:4861",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N",
                  version: "3.1",
               },
               products: [
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               details: "Low",
            },
         ],
         title: "tomcat: JNDI realm authentication weakness",
      },
      {
         cve: "CVE-2021-33037",
         cwe: {
            id: "CWE-444",
            name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')",
         },
         discovery_date: "2021-07-12T00:00:00+00:00",
         ids: [
            {
               system_name: "Red Hat Bugzilla ID",
               text: "1981533",
            },
         ],
         notes: [
            {
               category: "description",
               text: "Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding.",
               title: "Vulnerability description",
            },
            {
               category: "summary",
               text: "tomcat: HTTP request smuggling when used with a reverse proxy",
               title: "Vulnerability summary",
            },
            {
               category: "other",
               text: "Red Hat OpenStack Platform's OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.",
               title: "Statement",
            },
            {
               category: "general",
               text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
               title: "CVSS score applicability",
            },
         ],
         product_status: {
            fixed: [
               "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
               "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
               "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
               "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
               "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
               "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
               "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
               "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
               "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
               "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
               "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            ],
         },
         references: [
            {
               category: "self",
               summary: "Canonical URL",
               url: "https://access.redhat.com/security/cve/CVE-2021-33037",
            },
            {
               category: "external",
               summary: "RHBZ#1981533",
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=1981533",
            },
            {
               category: "external",
               summary: "https://www.cve.org/CVERecord?id=CVE-2021-33037",
               url: "https://www.cve.org/CVERecord?id=CVE-2021-33037",
            },
            {
               category: "external",
               summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-33037",
               url: "https://nvd.nist.gov/vuln/detail/CVE-2021-33037",
            },
         ],
         release_date: "2021-07-12T00:00:00+00:00",
         remediations: [
            {
               category: "vendor_fix",
               date: "2021-11-30T14:28:36+00:00",
               details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
               product_ids: [
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               ],
               restart_required: {
                  category: "none",
               },
               url: "https://access.redhat.com/errata/RHSA-2021:4861",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
                  version: "3.1",
               },
               products: [
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               details: "Moderate",
            },
         ],
         title: "tomcat: HTTP request smuggling when used with a reverse proxy",
      },
      {
         cve: "CVE-2021-42340",
         cwe: {
            id: "CWE-772",
            name: "Missing Release of Resource after Effective Lifetime",
         },
         discovery_date: "2021-10-14T00:00:00+00:00",
         ids: [
            {
               system_name: "Red Hat Bugzilla ID",
               text: "2014356",
            },
         ],
         notes: [
            {
               category: "description",
               text: "A memory leak flaw was found in Apache Tomcat, where an HTTP upgrade connection does not release for WebSocket connections once the WebSocket connection is closed. If a sufficient number of such requests are made, an OutOfMemoryError occurs, leading to a denial of service. The highest threat from this vulnerability is to system availability.",
               title: "Vulnerability description",
            },
            {
               category: "summary",
               text: "tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS",
               title: "Vulnerability summary",
            },
            {
               category: "other",
               text: "Within Red Hat OpenStack Platform, Tomcat is provided as a component of OpenDaylight. This flaw will not receive a fix as OpenDaylight was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.\n\nRed Hat Satellite does not include the affected Apache Tomcat, however, Tomcat is shipped with Red Hat Enterprise Linux and consumed by the Candlepin component of Satellite. Red Hat Satellite users are therefore advised to check the impact state of Red Hat Enterprise Linux, since any necessary fixes will be distributed through the platform.",
               title: "Statement",
            },
            {
               category: "general",
               text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
               title: "CVSS score applicability",
            },
         ],
         product_status: {
            fixed: [
               "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
               "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
               "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
               "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
               "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
               "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
               "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
               "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
               "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
               "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
               "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
               "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
               "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            ],
         },
         references: [
            {
               category: "self",
               summary: "Canonical URL",
               url: "https://access.redhat.com/security/cve/CVE-2021-42340",
            },
            {
               category: "external",
               summary: "RHBZ#2014356",
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014356",
            },
            {
               category: "external",
               summary: "https://www.cve.org/CVERecord?id=CVE-2021-42340",
               url: "https://www.cve.org/CVERecord?id=CVE-2021-42340",
            },
            {
               category: "external",
               summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-42340",
               url: "https://nvd.nist.gov/vuln/detail/CVE-2021-42340",
            },
            {
               category: "external",
               summary: "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.12",
               url: "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.12",
            },
            {
               category: "external",
               summary: "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.0-M6",
               url: "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.0-M6",
            },
            {
               category: "external",
               summary: "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.72",
               url: "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.72",
            },
            {
               category: "external",
               summary: "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.54",
               url: "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.54",
            },
            {
               category: "external",
               summary: "https://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E",
               url: "https://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E",
            },
         ],
         release_date: "2021-10-14T00:00:00+00:00",
         remediations: [
            {
               category: "vendor_fix",
               date: "2021-11-30T14:28:36+00:00",
               details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
               product_ids: [
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               ],
               restart_required: {
                  category: "none",
               },
               url: "https://access.redhat.com/errata/RHSA-2021:4861",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
                  "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
                  "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               details: "Important",
            },
         ],
         title: "tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.