このコンテンツは選択した言語では利用できません。
Release Notes 1.0.1
for use with Red Hat JBoss Web Server 1.0.1
Abstract
1. Introduction
1.1. Overview
Apache Tomcat 5.5.28
: Apache Tomcat is an implementation of the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Apache Tomcat version 5.5 implements the Servlet 2.4 and JavaServer Pages 2.0 specifications.Note
The default Red Hat Enterprise Linux 5 installation contains Apache Tomcat 5.5.23.Apache Tomcat 6.0.24
: Apache Tomcat is an implementation of the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Apache Tomcat version 6.0 implements the Servlet 2.5 and JavaServer Pages 2.1 specifications.Apache Tomcat Native 1.1.19
: Tomcat can use the Apache Portable Runtime to provide superior scalability, performance, and better integration with native server technologies. The Apache Portable Runtime is a highly portable library that is at the heart of Apache HTTP Server 2.x. APR has many uses, including access to advanced IO functionality (such as sendfile, epoll and OpenSSL), OS level functionality (random number generation, system status, etc), and native process handling (shared memory, NT pipes and Unix sockets). This package contains the Tomcat native library which provides support for using APR in Tomcat.Apache Tomcat Connector (mod_jk) 1.2.28
: Apache Tomcat Connector (mod_jk) is a bridge between Apache Httpd and Apache Tomcat using binary AJP protocol. It also contains a load balancer, which provides clustering and fault tolerance.Apache HTTP Server 2.2.14
: The Apache HTTP Server Project is an effort to develop and maintain an open-source HTTP server for modern operating systems. The goal of this project is to provide a secure, efficient and extensible server that provides HTTP services in sync with the current HTTP standards.Note
The default Red Hat Enterprise Linux 5 installation contains Apache HTTP Server 2.2.3-31.
- Red Hat Enterprise Linux 4, latest update (x86, x86_64)
- Red Hat Enterprise Linux 5, latest update (x86, x86_64)
- Solaris 9 (x86, SPARC32, SPARC64)
- Solaris 10 (x86, x86_64, SPARC64)
- Windows Server 2003 SP2 (x86, x86_64)
- Windows Server 2008 R2 (x86, x86_64)
Important
2. Installation Notes
Important
yum remove
Enterprise Application Platform before installing Enterprise Web Server.
2.1. Installation Notes for Red Hat Enterprise Linux
rpm
file; however we will also discuss installation via the zip
package.
up2date java-<version>-<vendor>
<version>
is 1.6.0 and <vendor>
can be sun or ibm.
yum install java-<version>-<vendor>
<version>
is 1.6.0 and <vendor>
can be sun, ibm or openjdk. Please note that OpenJDK is only available for version 1.6.0.
alternatives --config java alternatives --config javac
Important
java
and javac
commands will now be using the same JDK as well.
- If you are subscribed to the
Red Hat Application Stack
channel, you will need to disable that channel before installing the JBoss Enterprise Web Server. - Subscribe to the JBoss Enterprise Web Server channel: Red Hat Enterprise Linux 4 ews or Red Hat Enterprise Linux 5 ewsThe available channels for Red Hat Enterprise Linux 4 are:
- jb-ews-1-i386-es-4-rpm
- jb-ews-1-x86_64-as-4-rpm
- jb-ews-1-i386-es-4-rpm
- jb-ews-x86_64-es-4-rpm
The avaliable channels for Red Hat Enterprise Linux 5 are:- jb-ews-1-i386-server-5-rpm
- jb-ews-1-x86_64-server-5-rpm
- Install the packages: tomcat5, tomcat6, tomcat-native, httpd22 and mod_jkOn Red Hat Enterprise Linux 4 to install the packages, execute:
up2date tomcat6 tomcat6-webapps tomcat6-admin-webapps tomcat5 tomcat5-webapps tomcat5-admin-webapps ecj tomcat-native httpd22 mod_jk-ap20
- On Red Hat Enterprise Linux 5, to install the Tomcat 5 packages, you must make the following modification to the
/etc/yum.conf
file. Comment out the option:exactarch=1
Note
This change should be reverted when installation is complete to return yum configuration to the default settings.Then install the packages:yum install tomcat6 tomcat6-webapps tomcat6-admin-webapps tomcat5.noarch tomcat5-webapps.noarch tomcat5-admin-webapps.noarch tomcat-native httpd mod_jk-ap20
- Download the JBoss Enterprise Web Server zip file from the CSP site that is correct for your operating system and architecture.
- Unzip the file.
Important
2.2. Red Hat Enterprise Linux directory structure
. |-- jboss-ews-1.0 |-- httpd (includes mod_jk) |-- tomcat5 (includes tomcat-native) |-- tomcat6 (includes tomcat-native) |-- doc |-- jboss-ews-1.0-src |-- httpd |-- mod_jk |-- tomcat5 |-- tomcat6 |-- tomcat-native
2.3. Running the Installation
2.3.1. Running a RPM Installation
Tomcat can be started, stopped, and configured to start automatically at boot time either from the command line or using a graphical tool.
tomcat5
or tomcat6
services can be started and stopped using the service
command as root on a console window (as is typical of a network service):
tomcat5
service:
service tomcat5 start
service tomcat5 stop
tomcat6
service:
service tomcat6 start
service tomcat6 stop
su -s /bin/bash
tomcat
system command to deploy the application under the webapps directory. Alternatively, a developer can be listed in the tomcat user group by the system administrator. The best approach is to use the Web Console (URL above) to deploy the application.
chkconfig
command (see the chkconfig
man page for further details).
/etc/sysconfig/tomcat5
file for Tomcat version 5 and the /etc/sysconfig/tomcat6
file for Tomcat version 6.
The HTTP Server can be started, stopped, and configured to start automatically at boot time either from the command line or using a graphical tool.
service
command as root on a console window (as is typical of a network service):
service httpd22 start
service httpd22 stop
service httpd start
service httpd stop
/etc/sysconfig/httpd22
file on Red Hat Enterprise Linux 4 and the /etc/sysconfig/httpd
file on Red Hat Enterprise Linux 5.
To load the mod_jk module, the file /etc/httpd22/conf/httpd.conf
on Red Hat Enterprise Linux 4 or the file /etc/httpd/conf/httpd.conf
on Red Hat Enterprise Linux 5 needs to be updated, and a workers.properties
file needs to be added in that directory. See /usr/share/doc/mod_jk-ap20-1.2.28/mod_jk.conf.sample
and /usr/share/doc/mod_jk-ap20-1.2.28/workers.properties.sample
for examples of how this can be achieved.
To use log4j for logging in Tomcat 6, install the tomcat6-log4j
rpm file.
To use log4j for logging in Tomcat 5, you must copy the appropriate files from the Tomcat 6 distribution included in JBoss Enterprise Application Platform 1.0.1. Copy log4j.jar
from tomcat6/extras
into tomcat5/common/lib
. Copy log4j.properties
from tomcat6/extras
files into tomcat5/common/classes
.
Edit /etc/sysconfig/tomcat5
file for Tomcat 5 or /etc/sysconfig/tomcat6
for Tomcat 6 and add the LD_LIBRARY_PATH
variable so that it points to the library correct library:
LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/usr/lib64/
LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/usr/lib/
2.3.2. Running a ZIP Installation
After extracting the zip file, check to see if a user called tomcat
exists on the system by running the following command:
id tomcat
groupadd -g 91 -r tomcat useradd -c "Tomcat" -u 91 -g tomcat -s /bin/sh -r -d /home/tomcat tomcat
tomcat
user will be running Tomcat, then the ownership of the tomcat directories will need to be changed to reflect this:
chown -R tomcat:tomcat tomcat5
chown -R tomcat:tomcat tomcat6
tomcat
user has execution permission to the tomcat install path.
JAVA_HOME
variable must now be set and this can be achieved by either modifying your .bashrc
file or by modifying the Tomcat catalina.sh
file.
.bashrc
file, add the following line with the correct path to suit your systems configuration (a path is provided here as an example only):
export JAVA_HOME=/usr/lib/jvm/java
tomcat5/bin/catalina.sh
or tomcat6/bin/catalina.sh
file (depending on the version of Tomcat installed), add the following line with the correct path to suit your systems configuration (a path is provided here as an example only):
JAVA_HOME=/usr/lib/jvm/java
tomcat
:
sh startup.sh
sh shutdown.sh
In order to run the HTTP Server, the distcache and pcre rpm packages must be installed as they are a requirement of mod_ssl
. To check if these dependencies are already installed, execute the following in a command prompt:
rpm -q distcache pcre
up2date distcache up2date pcre
yum install distcache yum install pcre
y
key.
rpm -q distcache rpm -q pcre
httpd
directory and run the post install script by executing the following:
./.postinstall
apache
exists on the system by running the following command:
id apache
groupadd -g 91 -r apache 2> /dev/null || : useradd -c "Apache" -u 91 -g apache -s /bin/sh -r -d /home/apache apache 2> /dev/null || :
apache
user will be running the httpd
service, then the ownership of the HTTP directories will need to be changed to reflect this:
chown -R apache:apache httpd
apache
user has execution permission to the HTTP server install path.
httpd
directory and executing:
su -m -c "./sbin/apachectl start"
su -m -c "./sbin/apachectl stop"
To load the mod_jk module, the file httpd/conf/httpd.conf
needs to be updated, and a workers.properties
file needs to be added in that directory. See doc/mod_jk/mod_jk.conf.sample
and doc/mod_jk//workers.properties.sample
for examples of how this can be achieved.
The native library for Tomcat 6 is setup to be used by default, with the LD_LIBRARY_PATH
and -Djava.library.path
having been set accordingly within the catalina.sh
file.
Feb 8, 2008 12:27:41 PM org.apache.catalina.core.?AprLifecycleListener init INFO: Loaded APR based Apache Tomcat Native library 1.x.y. Feb 8, 2008 12:27:41 PM org.apache.catalina.core.?AprLifecycleListener init INFO: APR capabilities: IPv6 [true], sendfile [true], accept filters [false], random [true]. Feb 8, 2008 12:27:41 PM org.apache.coyote.http11.?Http11AprProtocol init INFO: Initializing Coyote HTTP/1.1 on http-8080
INFO: The Apache Tomcat Native library which allows optimal performance in production environments was not found on the java.library.path
In order to use log4j
logging in Tomcat 6, copy the content of the extras/
directory into the lib/
directory and restart Tomcat.
2.4. Installation Notes for Microsoft Windows
2.4.1. Prerequisites
- Java SDK 1.6
- System environment variables:
JAVA_HOME
- The install location of Java SDK 1.6.
TMP
- Temporary directory.
TEMP
- Temporary directory.
You must use a local administrator account to set up a system environment variable.Go to Control Panel > System and click on the Advanced tab. Click the button. Click the for System Variables, and enter the requiredJAVA_HOME
,TMP
andTEMP
name-value pairs.
2.4.2. Installing Enterprise Web Server
- Download the JBoss Enterprise Web Server zip file from the CSP site that is correct for your operating system and architecture.
- Unzip the Enterprise Web Server binary inside
C:\Program Files
.To extract the.zip
archive, right-click on the file and selectExtract All...
. Click . When prompted for the extract location, click and navigate to theC:\Program Files
directory. Click .Your files will be extracted toC:\Program Files\Red Hat\Enterprise Web Server
. - Run JBoss Enterprise Web Server as an administrator:
- Run the Command Prompt as an administrator. Click on > > . Right-click on Command Prompt and select
Run as administrator
.Note
You will need to selectRun as administrator
even if you are logged in as an administrator.Note
Windows Server 2003 does not have the User Account Control concept, so you will only need to run the Command Prompt (cmd.exe
). - Inside the Command Prompt, type the following to move to the
etc
directory of your Enterprise Web Server installation:C:\> cd /D "C:\Program Files\Red Hat\Enterprise Web Server\etc"
- Run the post-installation script by typing:
C:\> call postinstall.bat
This script creates the required symbolic links (Junction Points) for temporary logging and configuration directories.
2.4.3. Installing services
Installing Apache Httpd as a service
- Run the Command Prompt as administrator. Click on > > . Right-click on Command Prompt and select
Run as administrator
. - Move to the
bin
directory of your new installation:C:\> cd /D "C:\Program Files\Red Hat\Enterprise Web Server\bin"
Then type the following:C:\> httpd -k install
Note
This step can cause a Firewall security dialog prompt to allow networking access for the Apache Httpd service. Clickif you wish to access this service from the network.Note
By default, Apache Httpd is configured to listen on port 80. If you have Microsoft IIS installed, ensure either that:World Wide Web...
service is stopped and the Startup Type is set toManual
World Wide Web...
service is configured to listen on a different port
Alternatively, you can edit thehttpd.conf
file before installing the service and change theListen
directive to a port that will not collide with the Internet Information Service listening ports.
Installing Apache Tomcat as a service
- Run the Command Prompt as administrator. Click on > > . Right-click on Command Prompt and select
Run as administrator
.Note
On 64-bit Windows, you need to use the 64-bit version of the Command Prompt (cmd.exe
). Running thecmd
command from a 32-bit application launches a 32-bit Command Prompt instance. This causes the service setup script to fail with a File Not Found warning. - Move to the
sbin
directory in your JBoss Enterprise Web Server installation:C:\> cd /D "C:\Program Files\Red Hat\Enterprise Web Server\sbin"
Then type the following to install Apache Tomcat 6:C:\> call service6.bat install
You can check the service parameters by typingtomcat6w.exe
.Note
You can install Apache Tomcat 5.5 instead with thecall service5.bat install
command, and check its service parameters withtomcat5w.exe
.
2.4.3.1. Service security settings
C:\Program Files\Red Hat
folder and all of its subfolders.
For Windows Server 2003:
- Right-click on the
C:\Program Files\Red Hat
folder and click onProperties
. - Select the
Security
tab. - Click thebutton and type in
LOCAL SERVICE
. - Check the
Full Control
check box for the newLOCAL SERVICE
account. - Click thebutton.
- Inside the Advanced Security Settings for Red Hat dialog, check the
Replace permissions on all child objects...
check box and click the button.
2.5. Windows directory structure
|-- bin |-- doc |-- etc | |-- httpd | |-- postinstall.bat | |-- ssl | `-- sysconfig |-- include |-- lib64 |-- sbin |-- share | |-- apache-tomcat-5.5.28 | |-- apache-tomcat-6.0.24 | |-- java | |-- tomcat5 | `-- tomcat6 `-- var |-- cache |-- log |-- run `-- www
- The
bin
andsbin
directories contain the executable files for Apache HTTP Server and Tomcat. - The
etc
directory contains configuration files for Apache HTTP Server and the post-installation script. - The
share
directory contains Apache Tomcat 5 and 6 installations and shared Java JARs. - The
var
contains two sub-directories:log
- This directory contains the log files for Apache HTTP Server and Tomcat.
www
- Apache HTTP Server looks in this directory for web content in the
default
configuration.
2.6. Installation Notes for the Solaris Operating System
package
file; however we will also discuss installation via the zip
package.
Note
srpms
.
2.6.1. Installation using the Solaris package
gunzip
and pkgadd
commands. The commands will be:
gunzip RHATews-1.0.0*-solaris10-i386.package.gz
pkgadd -d RHATews-1.0.0*-solaris10-i386.package
The following packages are available: 1 RHATews JBoss Enterprise Web Server (i386) 1.0.0,REV=2.el5 Select package(s) you wish to process (or 'all' to process all packages). (default: all) [?,??,q]:
1
or just press enter
. The following information will now appear:
JBoss Enterprise Web Server(i386) 1.0.0,REV=2.GA END USER LICENSE AGREEMENT JBOSS(r) ENTERPRISE MIDDLEWARE(tm) The end user license agreement ("EULA") governs the use of the various software modules that collectively comprise JBoss Enterprise Middleware and any related updates, source code, appearance, structure and organization, regardless of the delivery mechanism. The JBoss Enterprise Middleware EULA can be found here: http://www.redhat.com/licenses/jboss_eula.html ## Executing checkinstall script. Using </opt> as the package base directory. ## Processing package information. ## Processing system information. ## Verifying disk space requirements. ## Checking for conflicts with packages already installed. ## Checking for setuid/setgid programs. This package contains scripts which will be executed with super-user permission during the process of installing this package. Do you want to continue with the installation of <RHATews> [y,n,?]
y
and press enter
.
## Executing postinstall script. Apache group (id=48) already exists. +++ or created if not Apache user (id=48) already exists. Generating private RSA key ... OK Generating new (+++ user hostname displayed here) certificate ... OK Tomcat group (id=91) already exists. Tomcat user (id=91) already exists. ----------------------------------------------------------------------- NOTICE ----------------------------------------------------------------------- JAVA_HOME environment variable is not set. Either set the JAVA_HOME or edit the configuration scripts inside `/opt/redhat/ews/etc/sysconfig' directory and set the JAVA_HOME to the installed JDK location. Installation of <RHATews> was successful.
/opt/redhat/ews
directory.
pkginfo -l RHATews
Note
JAVA_HOME
environment variable was not set. Configuring this is discussed later in the Section 2.8, “Running on a Solaris Operating System Installation” section.
2.6.2. Installation using the zip
package
zip
package requires root access and the GNU version of tar
.
/opt
directory since the post installation script will not run if installation occurs within a different location.
cd /opt unzip -q RHATews-1.0.0*-solaris10-i386.zip
cd /opt/redhat/ews/etc sh .postinstall
apache
with an ID of 48 and tomcat
with an ID of 91, will have been created. The apache
user will be used to run httpd
, while the tomcat
user will be used to run tomcat
.
tomcat
group has write permission to:
/var/logs/tomcat5
/var/logs/tomcat6
2.7. The Solaris operating system directory structure
. |-- /opt/redhat/ews |-- bin |-- doc |-- etc |-- lib |-- lib64 (present only for the x86_64 systems platform) |-- include |-- README |-- man |-- share |-- tomcat5 |-- tomcat6 |-- sbin |-- var
- Native Solaris packages require the absolute location
- Solaris operating systems (and other non-Red Hat Enterprise Linux platforms) must ship and build all the dependent components such as
openldap
,openssl
,db4
andcyrus-sasl
to name a few.
2.8. Running on a Solaris Operating System Installation
In order to run Tomcat on the Solaris operating system, some service configuration files will need manual editing.
JAVA_HOME
variable to the desired JDK in the configuration file. The configuration file can be found at:
/opt/redhat/ews/etc/sysconfig/tomcat5
/opt/redhat/ews/etc/sysconfig/tomcat6
sbin/tomcat5 start
sbin/tomcat6 start
catalina.sh
script is executed.
catalina.sh
script file can be found within:
/opt/redhat/ews/share/tomcat5/bin
/opt/redhat/ews/share/tomcat6/bin
sbin/tomcat5 stop
sbin/tomcat6 stop
tomcat-native
is automatically added to the LD_LIBRARY_PATH
and -Djava.library.path
during Tomcat startup. The catalina.sh
script detects the running JVM version and adds the /opt/redhat/ews/lib
path (/opt/redhat/ews/lib64
for 64 bit JVM) to the library path.
/opt/redhat/ews/etc/init.d
directory. The following commands can be used to copy the necessary scripts:
cp /opt/redhat/ews/etc/init.d/tomcat6 /etc/rc3.d/S70tomcat5 cp /opt/redhat/ews/etc/init.d/tomcat6 /etc/rcS.d/K20tomcat5
cp /opt/redhat/ews/etc/init.d/tomcat6 /etc/rc3.d/S70tomcat6 cp /opt/redhat/ews/etc/init.d/tomcat6 /etc/rcS.d/K20tomcat6
init
level numbers, consult your Solaris operating system documentation. The preferred method of service management is through the Solaris Service Management Facility
. In order to read more about this facility, consult the smf(5)
manual.
Apache httpd
configuration files are located inside the /opt/redhat/ews/etc/httpd
directory. By default all supported modules are loaded and enabled, so it is advised that you edit the httpd.conf
file and disable the modules you don't need.
apachectl
script located inside the /opt/redhat/ews/sbin
directory. The apachectl
script uses the configuration script, where you can edit and select various startup parameters, including the running of mpm
. The file used is /opt/redhat/ews/etc/sysconfig/httpd
sbin/apachectl start
sbin/apachectl stop
apachectl
script should be added to your system startup files.
Note
docs/httpd/invoking.html
and docs/httpd/stopping.html
respectively.
Running mod_jk on the Solaris operating system is the same as running the package on Red Hat Enterprise Linux installed via zip
. For detailed instructions see Running the mod_jk
2.9. Uninstalling the package in the Solaris operating sytem
pkgrm RHATews
/opt/redhat/ews
/var/run/tomcat5
/var/run/tomcat6
/var/cache/tomcat5
/var/cache/tomcat6
/var/log/httpd
/var/cache/mod_ssl
/var/cache/mod_proxy
2.10. Source Files
2.11. Excluded, Removed and Deprecated Items
Note
2.11.1. Excluded Items
Tomcat Clustering
has been excluded from theApache Tomcat 6
component. Specifically thecatalina-tribes.jar
file has been removed. This has occurred to eliminate any possibility of session replication and because Red Hat does not believe this feature is suitable for medium or large scale production deployments.
2.11.2. Deprecated Items
- The
Tomcat Clustering
feature ofApache Tomcat 5
is marked as deprecated for this release. Specifically thecatalina-cluster.jar
file has been deprecated.
2.11.3. Removed Items
2.12. Product Support and License Website Links
2.13. Issues fixed in this release
2.13.1. Fixed Security Issues
- CVE-2010-2086
- JBoss Enterprise Web Server 1.0.0 ships with Apache MyFaces 1.1.0. Apache MyFaces 1.1.0 does not support encrypted view state. When the application's view state is not encrypted, it is possible for an attacker to supply a new or modified view object as part of a request. This allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary Expression Language (EL) statements via vectors that involve modifying the serialized view object.This issue is resolved in JBoss Enterprise Web Server 1.0.1 because it does not include Apache MyFaces.
- CVE-2009-3555
- A flaw was found in the way the TLS/SSL (Transport Layer Security/Secure Sockets Layer) protocols handle session renegotiation on Red Hat Enterprise Linux 4 and 5. A man-in-the-middle attacker could use this flaw to prefix arbitrary plain text to a client's session (for example, an HTTPS connection to a website). This could force the server to process an attacker's request as if authenticated using the victim's credentials.Refer to the following Knowledgebase article for more information about how this issue affects JBoss Enterprise Web Server: http://kbase.redhat.com/faq/docs/DOC-20491
- CVE-2009-3095
- A flaw was found in the Apache mod_proxy_ftp module on Red Hat Enterprise Linux 4 and 5 such that, in a reverse proxy configuration, a remote attacker could bypass intended access restrictions by creating a HTTP Authorization header and send arbitrary commands to the FTP server. (RHSA-2010:0011)
- CVE-2009-3094
- A NULL pointer dereference flaw was found in the Apache mod_proxy_ftp module on Red Hat Enterprise Linux 4 and 5. A malicious FTP server to which requests were proxied could use this flaw to crash an httpd child process through a malformed reply to the EPSV or PASV commands, resulting in a limited denial of service. (RHSA-2010:0011)
- CVE-2009-2902
- A directory traversal flaw was found in the Tomcat deployment process. WAR file names were not being sanitized during Tomcat deployment in Red Hat Enterprise Linux 4 and 5. This could allow attackers to create a specially-crafted WAR file that could delete files in the Tomcat host's work directory. (RHSA-2010:0119)
- CVE-2009-2699
- A flaw was found in the way errors were handled in the Event Port back end in the Apache Portable Runtime (APR) library, used by the Apache HTTP Server. If an error was incorrectly handled while processing HTTP requests, httpd could hang. Note: This flaw only affected users running JBoss Enterprise Web Server on the Solaris operating system.
- CVE-2009-2693
- A directory traversal flaw was found in the Tomcat deployment process. An attacker could create a specially-crafted WAR file which, once deployed by an unsuspecting local user, would lead to attacker-controlled content being deployed outside the web root, into directories accessible to the Tomcat process. (RHSA-2010:0119)
- CVE-2009-2412
- Multiple integer overflow flaws that led to heap-based buffer overflows were found in the way the Apache Portable Runtime (APR) included in httpd22 manages memory pool and relocatable memory allocations on Red Hat Enterprise Linux 4. An attacker could use these flaws to issue a specially-crafted request for memory allocation, which would lead to a denial of service (application crash) or, potentially, execute arbitrary code with the privileges of an application using the APR libraries. (RHSA-2009:1462)
- CVE-2009-1955
- A denial of service flaw was found in the Apache HTTP Server apr-util Extensible Markup Language (XML) parser for Red Hat Enterprise Linux 4. A remote attacker could create a specially-crafted XML document that would cause excessive memory consumption when processed by the XML decoding engine. (RHSA-2009:1160)
- CVE-2009-1891
- A denial of service flaw was found in the Apache HTTP Server mod_deflate module for Red Hat Enterprise Linux 4 and 5. This module continued to compress large files until compression was complete, even if the network connection that requested the content was closed before compression completed. This caused mod_deflate to consume large amounts of CPU if mod_deflate was enabled for a large file. (RHSA-2009:1155, RHSA-2009:1160)
- CVE-2009-1890
- A denial of service flaw was found in the Apache HTTP Server mod_proxy module when it was used as a reverse proxy on Red Hat Enterprise Linux 4 and 5. A remote attacker could use this flaw to force a proxy process to consume large amounts of CPU time. (RHSA-2009:1155, RHSA-2009:1160)
- CVE-2009-1195
- In Apache HTTP Server on Red Hat Enterprise Linux 4 and 5, in configurations using the
AllowOverride
directive with certainOptions=
arguments, local users were not restricted from executing commands from a Server-Side-Include script as intended. (RHSA-2009:1155, RHSA-2009:1160) - CVE-2009-0783
- In Tomcat 5 and 6 on Red Hat Enterprise Linux 4 and 5, web applications containing their own XML parsers could replace the XML parser that Tomcat uses to parse configuration files. A malicious web application running on a Tomcat instance could read or, potentially, modify the configuration and XML-based data of other web applications deployed on the same Tomcat instance. (RHSA-2009:1506, RHSA-2009:1454)
- CVE-2009-0580
- In Tomcat 5 and 6 on Red Hat Enterprise Linux 4 and 5, the error checking methods of certain authentication classes did not have sufficient error checking, allowing remote attackers to ennumerate (via brute force methods) usernames registered with applications running on Tomcat when FORM-based authentication was used. (RHSA-2009:1506, RHSA-2009:1454)
- CVE-2009-0033
- A flaw was found in the way that the Tomcat 5 and 6 AJP (Apache JServ Protocol) connector processed AJP connections on Red Hat Enterprise Linux 4 and 5. An attacker could use this flaw to send specially-crafted requests that would cause a temporary denial of service. (RHSA-2009:1506, RHSA-2009:1454)
- CVE-2009-0023
- A heap-based underwrite flaw was discovered in the way Apache HTTP Server's apr-util library created compiled forms of particular search patterns on Red Hat Enterprise Linux 4. An attacker could formulate a specially-crafted search keyword that would overwrite arbitrary heap memory locatons when processed by the pattern preparation engine. (RHSA-2009:1160)
- CVE-2008-5515
- In Tomcat 5 and 6 on Red Hat Enterprise Linux 4 and 5, request dispatchers did not properly normalize user requests that had trailing query strings, which allowed remote attackers to send specially-crafted requests that would cause an information leak. (RHSA-2009:1506, RHSA-2009:1454)
- CVE-2007-5333
- Tomcat 5 did not properly handle a certain character sequence in cookie values on Red Hat Enterprise Linux 4 and 5. A remote attacker could use this flaw to obtain sensitive information, such as session IDs, and use this information for session hijacking attacks. (RHSA-2009:1454)
Note
Version 0 cookies that contain values that must be quoted to be valid are automatically changed to version 1 cookies. To reactivate the previous, but insecure, behavior, add the following entry to/etc/tomcat5/catalina.properties
org.apache.tomcat.util.http.ServerCookie.VERSION_SWITCH=false
- CVE-2009-1191
- An information disclosure flaw was found in Apache HTTP Server's mod_proxy_ajp module. In certain situations, if a user sent a specially-crafted HTTP request, the httpd server could return a response intended for another user. (RHSA-2009:1058)
2.13.2. General Fixed Issues
- JBPAPP-3272
- Installing the tomcat5-admin-webapps package resulted in missing dependencies. This made it impossible to access the Tomcat Administration section from http://localhost:8080/. The missing dependency,
jakarta-commons-chain
, has been added. - JBPAPP-3255
- The zip distribution of Enterprise Web Server 1.0 did not contain the administration web application, and directed users to download and install tomcat5-admin-webapps separately. The package is now included in the zip distribution.
- JBPAPP-2850
- Apache HTTP Server Control Interface (apachectl) required several modifications to work with Enterprise Web Server. The
httpd/.postinstall
script has been updated to make these modifications automatically. - JBPAPP-2122
- The apachectl binary available from the Customer Service Portal for Red Hat Enterprise Linux 4 and Red Hat Enterprise Linux 5 i386 was zero length. The fix for this caused problems with the RPM distribution. This has been corrected.
- JBPAPP-1838
- When Enterprise Web Server was installed by
zip
, thehttpd/.postinstall
script did not modify theconf/httpd.conf
file to point to the correctServerRoot
directory. - JBPAPP-1837
- Following RPM installation on Red Hat Enterprise Linux 4, the
/var/log/httpd22
directory was not automatically created, which forced thehttpd
startup script to fail. The directory is now created on startup. - JBPAPP-1809
- Some Tomcat users would receive a warning that there were no write permissions on the directory. This problem can no longer be reproduced.
- JBPAPP-1788
- Tomcat 6 on the Solaris operating system stopped at the command
/ews/etc/init.d/tomcat6 stop
, and though the server terminated successfully, the output displayed command usage errors because theCATALINA_PID
variable was not defined in Tomcat 6.CATALINA_PID
is now defined and the command usage errors no longer occur. - JBPAPP-1783
- Two Tomcat Native libraries,
libapr
andlibaprutil
have been included in Enterprise Web Server to prevent problems when running Enterprise Web Server on Red Hat Enterprise Linux 5.
2.13.3. Known Issues with this release
General Known Issues
- JBPAPP-3789
- Installing both Tomcat 5 and Tomcat 6 rpms causes Tomcat 5 to load the Tomcat 6 servlet JAR,
tomcat6-servlet-2.5-api.jar
, instead ofgeronimo-j2ee-1.4-apis.jar
. Before Tomcat 6 is installed, Tomcat 5 uses:/var/lib/tomcat5/common/lib/\[servlet\].jar -> /usr/share/java/servlet.jar -> /etc/alternatives/servlet -> /usr/share/java/geronimo-j2ee-1.4-apis.jar
After Tomcat 6 is installed, Tomcat 5 uses:/var/lib/tomcat5/common/lib/\[servlet\].jar -> /usr/share/java/servlet.jar -> /etc/alternatives/servlet -> /usr/share/java/tomcat6-servlet-2.5-api.jar
There are two workarounds to this issue:- Install only the Tomcat 6 rpm, and install Tomcat 5 from the zip download.
- Remove
/var/lib/tomcat5/common/lib/\[servlet\].jar
and copygeronimo-j2ee-1.4-apis.jar
to/var/lib/tomcat5/common/lib/
to achieve the same effect.
- JBPAPP-3762
- When JBoss Enterprise Web Server is run on the IBM Java Development Kit 1.6 using Java Security Manager, Tomcat 6 does not start.
- JBPAPP-3755
- The current JBoss ON plugin (v2.3) for JBoss Enterprise Web Server is not supported on Windows or Solaris platforms, and there are several known issues on Red Hat Enterprise Linux. JBoss ON support for JBoss Enterprise Web Server on these platforms is planned for a future release of JBoss ON.
- JBPAPP-3753
- Undeploying any web application in the
/manager
and/admin
applications causes an infinite loop. We do not currently recommend using the/manager
or/admin
applications to undeploy applications from your server. - JBPAPP-3735
- The Apache HTTP Server module mod_ssl provides an interface to the OpenSSL library, which provides Strong Encryption using the Transport Layer Security/Secure Sockets Layer security protocols. To use this feature, install the mod_ssl package.
- JBPAPP-3734
- Unless
<package>.noarch
is specified for Tomcat 5 packages, yum fetches all Tomcat 5 packages from the Red Hat Enterprise Linux 5 base channel instead of the JBoss Enterprise Web Server channel. The installation instructions have been modified to include a work-around for this issue. - JBPAPP-3685
- Attempting to edit server configuration details with the Tomcat 5 administration application results in some configuration information being lost from the configuration file (
server.xml
). At present we do not recommend using the the administration application for Tomcat 5. - JBPAPP-3658
- Attempting to delete an existing host with the Tomcat 5 Administration Tool results in a
NullPointerException
. This is a problem upstream and is expected to be fixed for JBoss Enterprise Web Server 1.0.2. - JBPAPP-3646
- The Tomcat 6 test suite attempts to compile and execute
org.apache.catalina.tomcat.util.http.TestCookies
instead oforg.apache.tomcat.util.http.TestCookies
. This is a problem upstream and is expected to be fixed for JBoss Enterprise Web Server 1.0.2. - JBPAPP-3644
- Setting
SECURITY_MANAGER="true"
insysconfig/tomcat5
orsysconfig/tomcat6
has no effect. To start the server securely, users must start with the-secure
flag, like so:catalina.sh start -secure
This is a problem upstream and is expected to be fixed for JBoss Enterprise Web Server 1.0.2. - JBPAPP-3628
- When a virtual host is created using the
/host-manager/html
application, all actions work as expected, but the newly created host is not persistently added to the Tomcat configuration. Only the localhost is listed after server restart. This is a problem upstream and is expected to be fixed for JBoss Enterprise Web Server 1.0.2. - JBPAPP-3627
- The Host Manager Help link in the
/host-manager
application leads to a HTTP 404 Error. This is a problem upstream and is expected to be fixed for JBoss Enterprise Web Server 1.0.2. - JBPAPP-3626
- The links that Tomcat Web Application Manager displays for
/host-manager
and/manager
result in a HTTP 404 Error. To work around this issue, add the following section to theWEB-INF/web.xml
descriptor, immediately after the servlet-mapping section:<welcome-file-list> <welcome-file> html/ </welcome-file> </welcome-file-list>
This is a problem upstream and is expected to be fixed for JBoss Enterprise Web Server 1.0.2. - JBPAPP-3625
- When Tomcat Native is used upon server shutdown, a "Server accept failed" error occurs because the AJP Connector continues to wait for a client connection during shutdown. This is a problem upstream and is expected to be fixed for JBoss Enterprise Web Server 1.0.2.
- JBPAPP-2852
- RPM installation shares Java library files. When Enterprise Web Server coexists with Enterprise Application Platform or similar, library version conflicts occur. Only one version (either Enterprise Web Server or Enterprise Application Platform) can exist on one server when RPM installation is used. The workaround for this issue is to
yum remove
Enterprise Application Platform before installing Enterprise Web Server. - JBPAPP-2655
jaxp_parser_impl.jar
andxml-commons-apis.jar
are not included in Tomcat 6. This can cause aSAXParseException
when parsing XML with a specific encoding (for example, GBK). Tomcat 6 requires JDK5 or higher; these JARs are not included in Tomcat because the JAXP implementation (JAXP 1.3) is built into JDK5. If users require encoding that is not supported by JAXP 1.3, the user must provide an external implementation of that encoding. The workaround for the missing JARs is therefore to copy them from Tomcat 5 into Tomcat 6.- JBPAPP-2150
- The presence of a
httpd-devel.i386
package in the Red Hat Enterprise Linux 5 base channel means that thehttpd-devel
may not be properly installed to the Red Hat Enterprise Linux x86_64 from the JBoss Enterprise Web Server channel. The correct way to install this package is to run the following command:yum install httpd-devel.x86_64
- JBPAPP-1966
- Apache Tomcat handles SSL encryption and decryption such that browser-httpd communication takes place in HTTPS. However, communication between httpd and JBoss Enterprise Web Server takes place in plain HTTP. By default, redirects will also use HTTP. To use HTTPS redirects, define the following attributes on the JBoss HTTP Connector:
proxyName="www.somedomain.com" proxyPort="443" scheme="https"
If JBoss Enterprise Web Server handles redirect requests for both HTTP and HTTPS, you will need one HTTP connector per protocol.
A. Revision History
Revision History | |||
---|---|---|---|
Revision 2.3.0-0.1 | Wed Feb 11 2015 | ||
| |||
Revision 1.0.1-13 | Tue Jun 21 2011 | ||
| |||
Revision 2.3.0-0 | Mon Dec 20 2010 | ||
| |||
Revision 2.2.0-0 | Thu Oct 07 2010 | ||
| |||
Revision 2.1.0-0 | Mon Feb 22 2010 | ||
|