rhsa-2021_4861
Vulnerability from csaf_redhat
Published
2021-11-30 14:28
Modified
2024-11-06 00:12
Summary
Red Hat Security Advisory: Red Hat JBoss Web Server 5.6.0 Security release

Notes

Topic
Updated Red Hat JBoss Web Server 5.6.0 packages are now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8. Red Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library. This release of Red Hat JBoss Web Server 5.6.0 serves as a replacement for Red Hat JBoss Web Server 5.5.0. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References. Security Fix(es): * tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS (CVE-2021-42340) * tomcat: HTTP request smuggling when used with a reverse proxy (CVE-2021-33037) * tomcat: JNDI realm authentication weakness (CVE-2021-30640) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated Red Hat JBoss Web Server 5.6.0 packages are now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 5.6.0 serves as a replacement for Red Hat JBoss Web Server 5.5.0. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References.\n\nSecurity Fix(es):\n\n* tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS (CVE-2021-42340)\n* tomcat: HTTP request smuggling when used with a reverse proxy (CVE-2021-33037)\n* tomcat: JNDI realm authentication weakness (CVE-2021-30640)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:4861",
        "url": "https://access.redhat.com/errata/RHSA-2021:4861"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1981533",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981533"
      },
      {
        "category": "external",
        "summary": "1981544",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981544"
      },
      {
        "category": "external",
        "summary": "2014356",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014356"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4861.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 5.6.0 Security release",
    "tracking": {
      "current_release_date": "2024-11-06T00:12:43+00:00",
      "generator": {
        "date": "2024-11-06T00:12:43+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.1.1"
        }
      },
      "id": "RHSA-2021:4861",
      "initial_release_date": "2021-11-30T14:28:36+00:00",
      "revision_history": [
        {
          "date": "2021-11-30T14:28:36+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-11-30T14:28:36+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-06T00:12:43+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
                "product": {
                  "name": "Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
                  "product_id": "7Server-JWS-5.6",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.6::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Server 5.6 for RHEL 8",
                "product": {
                  "name": "Red Hat JBoss Web Server 5.6 for RHEL 8",
                  "product_id": "8Base-JWS-5.6",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.6::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Web Server"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
                "product": {
                  "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
                  "product_id": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.50-3.redhat_00004.1.el7jws?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
                "product": {
                  "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
                  "product_id": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.30-3.redhat_3.el7jws?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
                "product": {
                  "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
                  "product_id": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-vault@1.1.8-4.Final_redhat_00004.1.el7jws?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
                "product": {
                  "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
                  "product_id": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.50-3.redhat_00004.1.el8jws?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
                "product": {
                  "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
                  "product_id": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.30-3.redhat_3.el8jws?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
                "product": {
                  "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
                  "product_id": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-vault@1.1.8-4.Final_redhat_00004.1.el8jws?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                "product": {
                  "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_id": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.50-3.redhat_00004.1.el7jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                "product": {
                  "name": "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_id": "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-admin-webapps@9.0.50-3.redhat_00004.1.el7jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                "product": {
                  "name": "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_id": "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-docs-webapp@9.0.50-3.redhat_00004.1.el7jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                "product": {
                  "name": "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_id": "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-el-3.0-api@9.0.50-3.redhat_00004.1.el7jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                "product": {
                  "name": "jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_id": "jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-java-jdk11@9.0.50-3.redhat_00004.1.el7jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                "product": {
                  "name": "jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_id": "jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-java-jdk8@9.0.50-3.redhat_00004.1.el7jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                "product": {
                  "name": "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_id": "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-javadoc@9.0.50-3.redhat_00004.1.el7jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                "product": {
                  "name": "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_id": "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-jsp-2.3-api@9.0.50-3.redhat_00004.1.el7jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                "product": {
                  "name": "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_id": "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-lib@9.0.50-3.redhat_00004.1.el7jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                "product": {
                  "name": "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_id": "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-selinux@9.0.50-3.redhat_00004.1.el7jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                "product": {
                  "name": "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_id": "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-servlet-4.0-api@9.0.50-3.redhat_00004.1.el7jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                "product": {
                  "name": "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_id": "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-webapps@9.0.50-3.redhat_00004.1.el7jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                "product": {
                  "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "product_id": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-vault@1.1.8-4.Final_redhat_00004.1.el7jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                "product": {
                  "name": "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "product_id": "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-vault-javadoc@1.1.8-4.Final_redhat_00004.1.el7jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                "product": {
                  "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "product_id": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.50-3.redhat_00004.1.el8jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                "product": {
                  "name": "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "product_id": "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-admin-webapps@9.0.50-3.redhat_00004.1.el8jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                "product": {
                  "name": "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "product_id": "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-docs-webapp@9.0.50-3.redhat_00004.1.el8jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                "product": {
                  "name": "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "product_id": "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-el-3.0-api@9.0.50-3.redhat_00004.1.el8jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                "product": {
                  "name": "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "product_id": "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-javadoc@9.0.50-3.redhat_00004.1.el8jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                "product": {
                  "name": "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "product_id": "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-jsp-2.3-api@9.0.50-3.redhat_00004.1.el8jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                "product": {
                  "name": "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "product_id": "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-lib@9.0.50-3.redhat_00004.1.el8jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                "product": {
                  "name": "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "product_id": "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-selinux@9.0.50-3.redhat_00004.1.el8jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                "product": {
                  "name": "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "product_id": "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-servlet-4.0-api@9.0.50-3.redhat_00004.1.el8jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                "product": {
                  "name": "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "product_id": "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-webapps@9.0.50-3.redhat_00004.1.el8jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                "product": {
                  "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "product_id": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-vault@1.1.8-4.Final_redhat_00004.1.el8jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                "product": {
                  "name": "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "product_id": "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-vault-javadoc@1.1.8-4.Final_redhat_00004.1.el8jws?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
                "product": {
                  "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "product_id": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.30-3.redhat_3.el7jws?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
                "product": {
                  "name": "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "product_id": "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-native-debuginfo@1.2.30-3.redhat_3.el7jws?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
                "product": {
                  "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "product_id": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.30-3.redhat_3.el8jws?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
                "product": {
                  "name": "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "product_id": "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws5-tomcat-native-debuginfo@1.2.30-3.redhat_3.el8jws?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
          "product_id": "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch"
        },
        "product_reference": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
        "relates_to_product_reference": "7Server-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
          "product_id": "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src"
        },
        "product_reference": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
        "relates_to_product_reference": "7Server-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
          "product_id": "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch"
        },
        "product_reference": "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
        "relates_to_product_reference": "7Server-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
          "product_id": "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch"
        },
        "product_reference": "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
        "relates_to_product_reference": "7Server-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
          "product_id": "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch"
        },
        "product_reference": "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
        "relates_to_product_reference": "7Server-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
          "product_id": "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch"
        },
        "product_reference": "jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
        "relates_to_product_reference": "7Server-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
          "product_id": "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch"
        },
        "product_reference": "jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
        "relates_to_product_reference": "7Server-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
          "product_id": "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch"
        },
        "product_reference": "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
        "relates_to_product_reference": "7Server-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
          "product_id": "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch"
        },
        "product_reference": "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
        "relates_to_product_reference": "7Server-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
          "product_id": "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch"
        },
        "product_reference": "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
        "relates_to_product_reference": "7Server-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
          "product_id": "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src"
        },
        "product_reference": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
        "relates_to_product_reference": "7Server-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64 as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
          "product_id": "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64"
        },
        "product_reference": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
        "relates_to_product_reference": "7Server-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64 as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
          "product_id": "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64"
        },
        "product_reference": "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
        "relates_to_product_reference": "7Server-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
          "product_id": "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch"
        },
        "product_reference": "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
        "relates_to_product_reference": "7Server-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
          "product_id": "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch"
        },
        "product_reference": "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
        "relates_to_product_reference": "7Server-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
          "product_id": "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch"
        },
        "product_reference": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
        "relates_to_product_reference": "7Server-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
          "product_id": "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src"
        },
        "product_reference": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
        "relates_to_product_reference": "7Server-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
          "product_id": "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch"
        },
        "product_reference": "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
        "relates_to_product_reference": "7Server-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server",
          "product_id": "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch"
        },
        "product_reference": "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
        "relates_to_product_reference": "7Server-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
          "product_id": "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
        },
        "product_reference": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
        "relates_to_product_reference": "8Base-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
          "product_id": "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src"
        },
        "product_reference": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
        "relates_to_product_reference": "8Base-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
          "product_id": "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
        },
        "product_reference": "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
        "relates_to_product_reference": "8Base-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
          "product_id": "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
        },
        "product_reference": "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
        "relates_to_product_reference": "8Base-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
          "product_id": "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
        },
        "product_reference": "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
        "relates_to_product_reference": "8Base-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
          "product_id": "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
        },
        "product_reference": "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
        "relates_to_product_reference": "8Base-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
          "product_id": "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
        },
        "product_reference": "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
        "relates_to_product_reference": "8Base-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
          "product_id": "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
        },
        "product_reference": "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
        "relates_to_product_reference": "8Base-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
          "product_id": "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src"
        },
        "product_reference": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
        "relates_to_product_reference": "8Base-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64 as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
          "product_id": "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64"
        },
        "product_reference": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
        "relates_to_product_reference": "8Base-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64 as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
          "product_id": "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64"
        },
        "product_reference": "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
        "relates_to_product_reference": "8Base-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
          "product_id": "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
        },
        "product_reference": "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
        "relates_to_product_reference": "8Base-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
          "product_id": "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
        },
        "product_reference": "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
        "relates_to_product_reference": "8Base-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
          "product_id": "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch"
        },
        "product_reference": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
        "relates_to_product_reference": "8Base-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
          "product_id": "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src"
        },
        "product_reference": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
        "relates_to_product_reference": "8Base-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
          "product_id": "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch"
        },
        "product_reference": "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
        "relates_to_product_reference": "8Base-JWS-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8",
          "product_id": "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
        },
        "product_reference": "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
        "relates_to_product_reference": "8Base-JWS-5.6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "the OpenSSL project"
          ],
          "organization": "Ingo Schwarze",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2021-3712",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2021-08-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1995634"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was found that openssl assumed ASN.1 strings to be NUL terminated. A malicious actor may be able to force an application into calling openssl function with a specially crafted, non-NUL terminated string to deliberately hit this bug, which may result in a crash of the application, causing a Denial of Service attack, or possibly, memory disclosure. The highest threat from this vulnerability is to data confidentiality and system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: Read buffer overruns processing ASN.1 strings",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The following Red Hat products do not ship the affected OpenSSL component but rely on the Red Hat Enterprise Linux to consume them:\n * Red Hat Satellite\n * Red Hat Update Infrastructure\n * Red Hat CloudForms\n\nThe Red Hat Advanced Cluster Management for Kubernetes is using the vulnerable version of the library, however the vulnerable code path is not reachable.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
          "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
          "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
          "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
          "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
          "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
          "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
          "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
          "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
          "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
          "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3712"
        },
        {
          "category": "external",
          "summary": "RHBZ#1995634",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3712",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712"
        },
        {
          "category": "external",
          "summary": "https://www.openssl.org/news/secadv/20210824.txt",
          "url": "https://www.openssl.org/news/secadv/20210824.txt"
        }
      ],
      "release_date": "2021-08-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-11-30T14:28:36+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:4861"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "openssl: Read buffer overruns processing ASN.1 strings"
    },
    {
      "cve": "CVE-2021-23840",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "discovery_date": "2021-02-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1930324"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissible length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: integer overflow in CipherUpdate",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw only affects applications which are compiled with OpenSSL and using  EVP_CipherUpdate, EVP_EncryptUpdate or EVP_DecryptUpdate functions. When specially-crafted values are passed to these functions, it can cause the application to crash or behave incorrectly.\n\nOpenSSL in Red Hat Enterprise Linux 9 was marked as not affected as its already fixed in RHEL9 Alpha release.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
          "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
          "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
          "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
          "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
          "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
          "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
          "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
          "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
          "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
          "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-23840"
        },
        {
          "category": "external",
          "summary": "RHBZ#1930324",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930324"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23840",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840"
        },
        {
          "category": "external",
          "summary": "https://www.openssl.org/news/secadv/20210216.txt",
          "url": "https://www.openssl.org/news/secadv/20210216.txt"
        }
      ],
      "release_date": "2021-02-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-11-30T14:28:36+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:4861"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "openssl: integer overflow in CipherUpdate"
    },
    {
      "cve": "CVE-2021-23841",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2021-02-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1930310"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: NULL pointer dereference in X509_issuer_and_serial_hash()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This is a a null pointer dereference in the X509_issuer_and_serial_hash()  function, which can result in crash if called by an application compiled with OpenSSL, by passing a specially-crafted certificate. OpenSSL internally does not use this function.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
          "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
          "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
          "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
          "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
          "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
          "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
          "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
          "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
          "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
          "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-23841"
        },
        {
          "category": "external",
          "summary": "RHBZ#1930310",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930310"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23841",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23841",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23841"
        },
        {
          "category": "external",
          "summary": "https://www.openssl.org/news/secadv/20210216.txt",
          "url": "https://www.openssl.org/news/secadv/20210216.txt"
        }
      ],
      "release_date": "2021-02-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-11-30T14:28:36+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:4861"
        },
        {
          "category": "workaround",
          "details": "As per upstream \"The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources.\"",
          "product_ids": [
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "openssl: NULL pointer dereference in X509_issuer_and_serial_hash()"
    },
    {
      "cve": "CVE-2021-30640",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2021-07-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1981544"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: JNDI realm authentication weakness",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
          "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
          "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
          "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
          "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
          "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
          "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
          "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
          "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
          "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
          "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-30640"
        },
        {
          "category": "external",
          "summary": "RHBZ#1981544",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981544"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30640",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-30640"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30640",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30640"
        }
      ],
      "release_date": "2021-07-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-11-30T14:28:36+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:4861"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: JNDI realm authentication weakness"
    },
    {
      "cve": "CVE-2021-33037",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2021-07-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1981533"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: HTTP request smuggling when used with a reverse proxy",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
          "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
          "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
          "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
          "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
          "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
          "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
          "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
          "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
          "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
          "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-33037"
        },
        {
          "category": "external",
          "summary": "RHBZ#1981533",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981533"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33037",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-33037"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33037",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33037"
        }
      ],
      "release_date": "2021-07-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-11-30T14:28:36+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:4861"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "tomcat: HTTP request smuggling when used with a reverse proxy"
    },
    {
      "cve": "CVE-2021-42340",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "discovery_date": "2021-10-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2014356"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in Apache Tomcat, where an HTTP upgrade connection does not release for WebSocket connections once the WebSocket connection is closed. If a sufficient number of such requests are made, an OutOfMemoryError occurs, leading to a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Within Red Hat OpenStack Platform, Tomcat is provided as a component of OpenDaylight. This flaw will not receive a fix as OpenDaylight was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.\n\nRed Hat Satellite does not include the affected Apache Tomcat, however, Tomcat is shipped with Red Hat Enterprise Linux and consumed by the Candlepin component of Satellite. Red Hat Satellite users are therefore advised to check the impact state of Red Hat Enterprise Linux, since any necessary fixes will be distributed through the platform.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
          "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
          "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
          "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
          "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
          "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
          "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
          "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
          "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
          "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
          "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
          "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
          "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-42340"
        },
        {
          "category": "external",
          "summary": "RHBZ#2014356",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014356"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-42340",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-42340"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42340",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42340"
        },
        {
          "category": "external",
          "summary": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.12",
          "url": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.12"
        },
        {
          "category": "external",
          "summary": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.0-M6",
          "url": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.0-M6"
        },
        {
          "category": "external",
          "summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.72",
          "url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.72"
        },
        {
          "category": "external",
          "summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.54",
          "url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.54"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E",
          "url": "https://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E"
        }
      ],
      "release_date": "2021-10-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-11-30T14:28:36+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:4861"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64",
            "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src",
            "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch",
            "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64",
            "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src",
            "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch",
            "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.