이 콘텐츠는 선택한 언어로 제공되지 않습니다.

Chapter 7.  Issues fixed in this release


The following sections detail the issues fixed in this release of JBoss Enterprise Web Server.

General Fixed Issues

JBPAPP-4529
No request is forwarded to a worker node after it has failed, even though it is marked as available in the balance manager. This issue has been resolved with JBoss Enterprise Web Platform 1.0.2.
JBPAPP-4207
Running service5.bat remove on Windows disables the Tomcat service instead of removing it. This has been fixed JBoss Enterprise Web Server 1.0.2.
JBPAPP-3938
The manager application is unable to undeploy a .war application deployed on the Tomcat 5 server. Deploying an expanded .war throws a similar error but does undeploy the application. This issue is fixed with this release of JBoss Enterprise Web Server.
JBPAPP-3888
apachectl22 executes /usr/sbin/httpd instead of /usr/sbin/httpd22, which causes the wrong httpd version to run. This issue has been fixed and apachectl22 now runs /usr/sbin/httpd22.
JBPAPP-3789
Installing both Tomcat 5 and Tomcat 6 rpms causes Tomcat 5 to load the Tomcat 6 servlet JAR, tomcat6-servlet-2.5-api.jar, instead of geronimo-j2ee-1.4-apis.jar. Before Tomcat 6 is installed, Tomcat 5 uses:
/var/lib/tomcat5/common/lib/\[servlet\].jar -> /usr/share/java/servlet.jar -> 
/etc/alternatives/servlet -> /usr/share/java/geronimo-j2ee-1.4-apis.jar
Copy to Clipboard Toggle word wrap
After Tomcat 6 is installed, Tomcat 5 uses:
/var/lib/tomcat5/common/lib/\[servlet\].jar -> /usr/share/java/servlet.jar -> 
/etc/alternatives/servlet -> /usr/share/java/tomcat6-servlet-2.5-api.jar
Copy to Clipboard Toggle word wrap
This issue has been fixed by correcting the symlinks in tomcat5 so that it links to the servlet and jsp jars from the tomcat5 build instead of the alternatives one.
JBPAPP-3758
Configuration for the welcome page of Enterprise Web Server in httpd/conf.d/welcome redirects requests to /error/noindex.html file, but the noindex.html file in the httpd/www/error directory does not exist. Zips installed on Red Hat Enterprise Linux 5 do not work, as a result. This issue has been fixed with JBoss Enterprise Web Server 1.0.2.
JBPAPP-3753
Undeploying any web application in the /manager and /admin applications causes an infinite loop. We do not currently recommend using the /manager or /admin applications to undeploy applications from your server.
JBPAPP-3685
Attempting to edit server configuration details with the Tomcat 5 administration application results in some configuration information being lost from the configuration file (server.xml). This issue has been fixed with JBoss Enterprise Web Server 1.0.2.
JBPAPP-3658
Attempting to delete an existing host with the Tomcat 5 Administration Tool results in a NullPointerException. This has been fixed with JBoss Enterprise Web Server 1.0.2.
JBPAPP-3646
The Tomcat 6 test suite attempts to compile and execute org.apache.catalina.tomcat.util.http.TestCookies instead of org.apache.tomcat.util.http.TestCookies. This issue is fixed upstream and with this release of JBoss Enterprise Web Server.
JBPAPP-3644
Setting SECURITY_MANAGER="true" in sysconfig/tomcat5 or sysconfig/tomcat6 has no effect. This issue has been resolved by modifying catalina.sh to switch to -security mode if SECURITY_MANAGER=true is set.

mod_cluster Fixed Issues

JBPAPP-3349
Should you encounter an [emerg] create_mem_node <node file path> failed error, use the ipcrm -m command before restarting httpd.

Security Fixed Issues

CVE-2011-0419
It was found that the apr_fnmatch() function used an unconstrained recursion when processing patterns with the '*' wildcard. An attacker could use this flaw to cause an application using this function, which also accepted untrusted input as a pattern for matching (such as an httpd server using the mod_autoindex module), to exhaust all stack memory or use an excessive amount of CPU time when performing matching.
CVE-2011-0013
A cross-site scripting (XSS) flaw was found in the Manager application. A malicious web application could use this flaw to conduct an XSS attack, leading to arbitrary web script execution with the privileges of victims who are logged into and viewing Manager application web pages.
CVE-2010-4172
A cross-site scripting (XSS) flaw was found in the Manager application, used for managing web applications on Apache Tomcat. If a remote attacker could trick a user who is logged into the Manager application into visiting a specially-crafted URL, the attacker could perform Manager application tasks with the privileges of the logged in user.
CVE-2010-3718
It was found that web applications could modify the location of the Apache Tomcat host's work directory. As web applications deployed on Tomcat have read and write access to this directory, a malicious web application could use this flaw to trick Tomcat into giving it read and write access to an arbitrary directory on the file system.
CVE-2010-2068
A flaw was discovered in the way the mod_proxy_http module of the Apache HTTP Server handled the timeouts of requests forwarded by a reverse proxy to the back-end server. In some configurations, the proxy could return a response intended for another user under certain timeout conditions, possibly leading to information disclosure. Note: This issue only affected httpd running on the Windows operating system.
CVE-2010-1623
It was found that certain input could cause the apr-util library to allocate more memory than intended in the apr_brigade_split_line() function. An attacker able to provide input in small chunks to an application using the apr-util library (such as httpd) could possibly use this flaw to trigger high memory consumption.
CVE-2010-1452
A flaw was found in the way the mod_dav module of the Apache HTTP Server handled certain requests. If a remote attacker were to send a carefully crafted request to the server, it could cause the httpd child process to crash.
CVE-2010-1157
A possible minor information leak was found in the way Apache Tomcat generated HTTP BASIC and DIGEST authentication requests. For configurations where a realm name was not specified and Tomcat was accessed via a proxy, the default generated realm contained the hostname and port used by the proxy to send requests to the Tomcat server.
Windows and Solaris Security Issues

The following flaws were corrected in the packages for Solaris and Windows.

Multiple flaws in OpenSSL, which could possibly cause a crash, code execution, or a change of session parameters, have been corrected.
Two denial of service flaws were corrected in Expat.
An X.509 certificate verification flaw was corrected in OpenLDAP.
맨 위로 이동
Red Hat logoGithubredditYoutubeTwitter

자세한 정보

평가판, 구매 및 판매

커뮤니티

Red Hat 문서 정보

Red Hat을 사용하는 고객은 신뢰할 수 있는 콘텐츠가 포함된 제품과 서비스를 통해 혁신하고 목표를 달성할 수 있습니다. 최신 업데이트를 확인하세요.

보다 포괄적 수용을 위한 오픈 소스 용어 교체

Red Hat은 코드, 문서, 웹 속성에서 문제가 있는 언어를 교체하기 위해 최선을 다하고 있습니다. 자세한 내용은 다음을 참조하세요.Red Hat 블로그.

Red Hat 소개

Red Hat은 기업이 핵심 데이터 센터에서 네트워크 에지에 이르기까지 플랫폼과 환경 전반에서 더 쉽게 작업할 수 있도록 강화된 솔루션을 제공합니다.

Theme

© 2025 Red Hat