이 콘텐츠는 선택한 언어로 제공되지 않습니다.
Chapter 7. Issues fixed in this release
The following sections detail the issues fixed in this release of JBoss Enterprise Web Server.
General Fixed Issues
- JBPAPP-4529
- No request is forwarded to a worker node after it has failed, even though it is marked as available in the balance manager. This issue has been resolved with JBoss Enterprise Web Platform 1.0.2.
- JBPAPP-4207
- Running
service5.bat remove
on Windows disables the Tomcat service instead of removing it. This has been fixed JBoss Enterprise Web Server 1.0.2. - JBPAPP-3938
- The manager application is unable to undeploy a .war application deployed on the Tomcat 5 server. Deploying an expanded .war throws a similar error but does undeploy the application. This issue is fixed with this release of JBoss Enterprise Web Server.
- JBPAPP-3888
- apachectl22 executes
/usr/sbin/httpd
instead of/usr/sbin/httpd22
, which causes the wrong httpd version to run. This issue has been fixed and apachectl22 now runs/usr/sbin/httpd22
. - JBPAPP-3789
- Installing both Tomcat 5 and Tomcat 6 rpms causes Tomcat 5 to load the Tomcat 6 servlet JAR,
tomcat6-servlet-2.5-api.jar
, instead ofgeronimo-j2ee-1.4-apis.jar
. Before Tomcat 6 is installed, Tomcat 5 uses:/var/lib/tomcat5/common/lib/\[servlet\].jar -> /usr/share/java/servlet.jar -> /etc/alternatives/servlet -> /usr/share/java/geronimo-j2ee-1.4-apis.jar
/var/lib/tomcat5/common/lib/\[servlet\].jar -> /usr/share/java/servlet.jar -> /etc/alternatives/servlet -> /usr/share/java/geronimo-j2ee-1.4-apis.jar
Copy to Clipboard Copied! Toggle word wrap Toggle overflow After Tomcat 6 is installed, Tomcat 5 uses:/var/lib/tomcat5/common/lib/\[servlet\].jar -> /usr/share/java/servlet.jar -> /etc/alternatives/servlet -> /usr/share/java/tomcat6-servlet-2.5-api.jar
/var/lib/tomcat5/common/lib/\[servlet\].jar -> /usr/share/java/servlet.jar -> /etc/alternatives/servlet -> /usr/share/java/tomcat6-servlet-2.5-api.jar
Copy to Clipboard Copied! Toggle word wrap Toggle overflow This issue has been fixed by correcting the symlinks in tomcat5 so that it links to the servlet and jsp jars from the tomcat5 build instead of the alternatives one. - JBPAPP-3758
- Configuration for the welcome page of Enterprise Web Server in httpd/conf.d/welcome redirects requests to /error/noindex.html file, but the noindex.html file in the httpd/www/error directory does not exist. Zips installed on Red Hat Enterprise Linux 5 do not work, as a result. This issue has been fixed with JBoss Enterprise Web Server 1.0.2.
- JBPAPP-3753
- Undeploying any web application in the
/manager
and/admin
applications causes an infinite loop. We do not currently recommend using the/manager
or/admin
applications to undeploy applications from your server. - JBPAPP-3685
- Attempting to edit server configuration details with the Tomcat 5 administration application results in some configuration information being lost from the configuration file (server.xml). This issue has been fixed with JBoss Enterprise Web Server 1.0.2.
- JBPAPP-3658
- Attempting to delete an existing host with the Tomcat 5 Administration Tool results in a
NullPointerException
. This has been fixed with JBoss Enterprise Web Server 1.0.2. - JBPAPP-3646
- The Tomcat 6 test suite attempts to compile and execute
org.apache.catalina.tomcat.util.http.TestCookies
instead oforg.apache.tomcat.util.http.TestCookies
. This issue is fixed upstream and with this release of JBoss Enterprise Web Server. - JBPAPP-3644
- Setting
SECURITY_MANAGER="true"
insysconfig/tomcat5
orsysconfig/tomcat6
has no effect. This issue has been resolved by modifying catalina.sh to switch to -security mode if SECURITY_MANAGER=true is set.
mod_cluster Fixed Issues
- JBPAPP-3349
- Should you encounter an [emerg] create_mem_node <node file path> failed error, use the ipcrm -m command before restarting httpd.
Security Fixed Issues
- CVE-2011-0419
- It was found that the apr_fnmatch() function used an unconstrained recursion when processing patterns with the '*' wildcard. An attacker could use this flaw to cause an application using this function, which also accepted untrusted input as a pattern for matching (such as an httpd server using the mod_autoindex module), to exhaust all stack memory or use an excessive amount of CPU time when performing matching.
- CVE-2011-0013
- A cross-site scripting (XSS) flaw was found in the Manager application. A malicious web application could use this flaw to conduct an XSS attack, leading to arbitrary web script execution with the privileges of victims who are logged into and viewing Manager application web pages.
- CVE-2010-4172
- A cross-site scripting (XSS) flaw was found in the Manager application, used for managing web applications on Apache Tomcat. If a remote attacker could trick a user who is logged into the Manager application into visiting a specially-crafted URL, the attacker could perform Manager application tasks with the privileges of the logged in user.
- CVE-2010-3718
- It was found that web applications could modify the location of the Apache Tomcat host's work directory. As web applications deployed on Tomcat have read and write access to this directory, a malicious web application could use this flaw to trick Tomcat into giving it read and write access to an arbitrary directory on the file system.
- CVE-2010-2068
- A flaw was discovered in the way the mod_proxy_http module of the Apache HTTP Server handled the timeouts of requests forwarded by a reverse proxy to the back-end server. In some configurations, the proxy could return a response intended for another user under certain timeout conditions, possibly leading to information disclosure. Note: This issue only affected httpd running on the Windows operating system.
- CVE-2010-1623
- It was found that certain input could cause the apr-util library to allocate more memory than intended in the apr_brigade_split_line() function. An attacker able to provide input in small chunks to an application using the apr-util library (such as httpd) could possibly use this flaw to trigger high memory consumption.
- CVE-2010-1452
- A flaw was found in the way the mod_dav module of the Apache HTTP Server handled certain requests. If a remote attacker were to send a carefully crafted request to the server, it could cause the httpd child process to crash.
- CVE-2010-1157
- A possible minor information leak was found in the way Apache Tomcat generated HTTP BASIC and DIGEST authentication requests. For configurations where a realm name was not specified and Tomcat was accessed via a proxy, the default generated realm contained the hostname and port used by the proxy to send requests to the Tomcat server.
Windows and Solaris Security Issues
The following flaws were corrected in the packages for Solaris and Windows.
Multiple flaws in OpenSSL, which could possibly cause a crash, code execution, or a change of session parameters, have been corrected.
Two denial of service flaws were corrected in Expat.
An X.509 certificate verification flaw was corrected in OpenLDAP.