Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.

Chapter 7.  Issues fixed in this release


The following sections detail the issues fixed in this release of JBoss Enterprise Web Server.

General Fixed Issues

JBPAPP-4529
No request is forwarded to a worker node after it has failed, even though it is marked as available in the balance manager. This issue has been resolved with JBoss Enterprise Web Platform 1.0.2.
JBPAPP-4207
Running service5.bat remove on Windows disables the Tomcat service instead of removing it. This has been fixed JBoss Enterprise Web Server 1.0.2.
JBPAPP-3938
The manager application is unable to undeploy a .war application deployed on the Tomcat 5 server. Deploying an expanded .war throws a similar error but does undeploy the application. This issue is fixed with this release of JBoss Enterprise Web Server.
JBPAPP-3888
apachectl22 executes /usr/sbin/httpd instead of /usr/sbin/httpd22, which causes the wrong httpd version to run. This issue has been fixed and apachectl22 now runs /usr/sbin/httpd22.
JBPAPP-3789
Installing both Tomcat 5 and Tomcat 6 rpms causes Tomcat 5 to load the Tomcat 6 servlet JAR, tomcat6-servlet-2.5-api.jar, instead of geronimo-j2ee-1.4-apis.jar. Before Tomcat 6 is installed, Tomcat 5 uses:
/var/lib/tomcat5/common/lib/\[servlet\].jar -> /usr/share/java/servlet.jar -> 
/etc/alternatives/servlet -> /usr/share/java/geronimo-j2ee-1.4-apis.jar
Copy to Clipboard Toggle word wrap
After Tomcat 6 is installed, Tomcat 5 uses:
/var/lib/tomcat5/common/lib/\[servlet\].jar -> /usr/share/java/servlet.jar -> 
/etc/alternatives/servlet -> /usr/share/java/tomcat6-servlet-2.5-api.jar
Copy to Clipboard Toggle word wrap
This issue has been fixed by correcting the symlinks in tomcat5 so that it links to the servlet and jsp jars from the tomcat5 build instead of the alternatives one.
JBPAPP-3758
Configuration for the welcome page of Enterprise Web Server in httpd/conf.d/welcome redirects requests to /error/noindex.html file, but the noindex.html file in the httpd/www/error directory does not exist. Zips installed on Red Hat Enterprise Linux 5 do not work, as a result. This issue has been fixed with JBoss Enterprise Web Server 1.0.2.
JBPAPP-3753
Undeploying any web application in the /manager and /admin applications causes an infinite loop. We do not currently recommend using the /manager or /admin applications to undeploy applications from your server.
JBPAPP-3685
Attempting to edit server configuration details with the Tomcat 5 administration application results in some configuration information being lost from the configuration file (server.xml). This issue has been fixed with JBoss Enterprise Web Server 1.0.2.
JBPAPP-3658
Attempting to delete an existing host with the Tomcat 5 Administration Tool results in a NullPointerException. This has been fixed with JBoss Enterprise Web Server 1.0.2.
JBPAPP-3646
The Tomcat 6 test suite attempts to compile and execute org.apache.catalina.tomcat.util.http.TestCookies instead of org.apache.tomcat.util.http.TestCookies. This issue is fixed upstream and with this release of JBoss Enterprise Web Server.
JBPAPP-3644
Setting SECURITY_MANAGER="true" in sysconfig/tomcat5 or sysconfig/tomcat6 has no effect. This issue has been resolved by modifying catalina.sh to switch to -security mode if SECURITY_MANAGER=true is set.

mod_cluster Fixed Issues

JBPAPP-3349
Should you encounter an [emerg] create_mem_node <node file path> failed error, use the ipcrm -m command before restarting httpd.

Security Fixed Issues

CVE-2011-0419
It was found that the apr_fnmatch() function used an unconstrained recursion when processing patterns with the '*' wildcard. An attacker could use this flaw to cause an application using this function, which also accepted untrusted input as a pattern for matching (such as an httpd server using the mod_autoindex module), to exhaust all stack memory or use an excessive amount of CPU time when performing matching.
CVE-2011-0013
A cross-site scripting (XSS) flaw was found in the Manager application. A malicious web application could use this flaw to conduct an XSS attack, leading to arbitrary web script execution with the privileges of victims who are logged into and viewing Manager application web pages.
CVE-2010-4172
A cross-site scripting (XSS) flaw was found in the Manager application, used for managing web applications on Apache Tomcat. If a remote attacker could trick a user who is logged into the Manager application into visiting a specially-crafted URL, the attacker could perform Manager application tasks with the privileges of the logged in user.
CVE-2010-3718
It was found that web applications could modify the location of the Apache Tomcat host's work directory. As web applications deployed on Tomcat have read and write access to this directory, a malicious web application could use this flaw to trick Tomcat into giving it read and write access to an arbitrary directory on the file system.
CVE-2010-2068
A flaw was discovered in the way the mod_proxy_http module of the Apache HTTP Server handled the timeouts of requests forwarded by a reverse proxy to the back-end server. In some configurations, the proxy could return a response intended for another user under certain timeout conditions, possibly leading to information disclosure. Note: This issue only affected httpd running on the Windows operating system.
CVE-2010-1623
It was found that certain input could cause the apr-util library to allocate more memory than intended in the apr_brigade_split_line() function. An attacker able to provide input in small chunks to an application using the apr-util library (such as httpd) could possibly use this flaw to trigger high memory consumption.
CVE-2010-1452
A flaw was found in the way the mod_dav module of the Apache HTTP Server handled certain requests. If a remote attacker were to send a carefully crafted request to the server, it could cause the httpd child process to crash.
CVE-2010-1157
A possible minor information leak was found in the way Apache Tomcat generated HTTP BASIC and DIGEST authentication requests. For configurations where a realm name was not specified and Tomcat was accessed via a proxy, the default generated realm contained the hostname and port used by the proxy to send requests to the Tomcat server.
Windows and Solaris Security Issues

The following flaws were corrected in the packages for Solaris and Windows.

Multiple flaws in OpenSSL, which could possibly cause a crash, code execution, or a change of session parameters, have been corrected.
Two denial of service flaws were corrected in Expat.
An X.509 certificate verification flaw was corrected in OpenLDAP.
Nach oben
Red Hat logoGithubredditYoutubeTwitter

Lernen

Testen, kaufen und verkaufen

Communitys

Über Red Hat Dokumentation

Wir helfen Red Hat Benutzern, mit unseren Produkten und Diensten innovativ zu sein und ihre Ziele zu erreichen – mit Inhalten, denen sie vertrauen können. Entdecken Sie unsere neuesten Updates.

Mehr Inklusion in Open Source

Red Hat hat sich verpflichtet, problematische Sprache in unserem Code, unserer Dokumentation und unseren Web-Eigenschaften zu ersetzen. Weitere Einzelheiten finden Sie in Red Hat Blog.

Über Red Hat

Wir liefern gehärtete Lösungen, die es Unternehmen leichter machen, plattform- und umgebungsübergreifend zu arbeiten, vom zentralen Rechenzentrum bis zum Netzwerkrand.

Theme

© 2025 Red Hat