First published: Tue Nov 30 2021(Updated: )
Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.<br>This release of Red Hat JBoss Web Server 5.6.0 serves as a replacement for Red Hat JBoss Web Server 5.5.0. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References.<br>Security Fix(es):<br><li> tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS (CVE-2021-42340)</li> <li> tomcat: HTTP request smuggling when used with a reverse proxy (CVE-2021-33037)</li> <li> tomcat: JNDI realm authentication weakness (CVE-2021-30640)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Web Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:4863 is categorized as important due to potential security vulnerabilities affecting Red Hat JBoss Web Server.
To fix RHSA-2021:4863, you should apply the latest updates available for Red Hat JBoss Web Server as recommended in the advisory.
RHSA-2021:4863 affects the Apache Tomcat Servlet container and its associated components within Red Hat JBoss Web Server.
There are no specific workarounds for RHSA-2021:4863; updating to the patched version is the recommended approach.
RHSA-2021:4863 was released on December 14, 2021.