Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHEA-2015:1770 - Product Enhancement Advisory
Issued:
2015-09-10
Updated:
2015-09-10

RHEA-2015:1770 - Product Enhancement Advisory

  • Overview
  • Updated Packages

Synopsis

Red Hat JBoss Web Server 3.0.1 enhancement update

Type/Severity

Product Enhancement Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated Red Hat JBoss Web Server 3.0.1 packages are now available for Red Hat Enterprise Linux 7.

Description

Red Hat JBoss Web Server is a fully integrated and certified set of
components for hosting Java web applications. It is comprised of the Apache
HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector
(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat
Native library.

  • This enhancement update adds the Red Hat JBoss Web Server 3.0.1 packages to Red Hat Enterprise Linux 7. These packages provide a number of enhancements over the previous version of Red Hat JBoss Web Server. (JIRA#JWS-111)

Users of Red Hat JBoss Web Server are advised to upgrade to these updated packages, which add this enhancement.

Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • JBoss Enterprise Web Server 3 for RHEL 7 x86_64

Fixes

  • BZ - 1219752 - JWS3.0.1 tracker for RHEL7

CVEs

  • CVE-2014-0230
  • CVE-2014-8111
  • CVE-2015-0288

References

  • http://www.redhat.com/security/updates/classification/#normal
Note: More recent versions of these packages may be available. Click a package name for more details.

JBoss Enterprise Web Server 3 for RHEL 7

SRPM
mod_bmx-0.9.5-5.GA.ep7.el7.src.rpm SHA-256: 5cf9c8e3ad1fa2039d50f9ea1f93524e80a0d4d2d05bc60747bb5edd99bcf880
mod_cluster-1.3.1-8.Final_redhat_3.1.ep7.el7.src.rpm SHA-256: c21e0ee0b70e17576a85e92bd085d4d6127edbdb7aed8caa93eac270b47508ed
mod_jk-1.2.40-8.redhat_1.ep7.el7.src.rpm SHA-256: 2a2f9ca26db19805cf4decdb9a34b15382e4059f659de7ac73c7db79625f2a6a
mod_security-jws3-2.8.0-6.GA.ep7.el7.src.rpm SHA-256: 232afdd347b93a99097a452fdf6803e2528dd6a931799c701e83b6257042ca17
tomcat7-7.0.59-26_patch_00.ep7.el7.src.rpm SHA-256: b0e099eafeec861cec72b91c05b5e213415d81c7cce42268bf5123ae90184d64
tomcat8-8.0.18-25_patch_00.ep7.el7.src.rpm SHA-256: a129383042369af97e6b072a7d3bf4e637d7d20359101ae23ebb0da205d3206f
x86_64
mod_bmx-0.9.5-5.GA.ep7.el7.x86_64.rpm SHA-256: 2f056c589efa68c7839af150936a0de99d3aac69fa911bbf625fd22c534199f5
mod_bmx-debuginfo-0.9.5-5.GA.ep7.el7.x86_64.rpm SHA-256: 727df113bf27ca8d8dc60eb17741a3ecb93fdd734c42d3c88c89b0630307f069
mod_cluster-1.3.1-8.Final_redhat_3.1.ep7.el7.noarch.rpm SHA-256: 48e45f88072fdc7a7ca3f74e61f6c479d40d8fb06257b07d30d96eb9539bbffd
mod_cluster-tomcat7-1.3.1-8.Final_redhat_3.1.ep7.el7.noarch.rpm SHA-256: a7cab235b528dd81f3aba894edb9bbd1c204317271ae61a4d053ba7b2bef89e2
mod_cluster-tomcat8-1.3.1-8.Final_redhat_3.1.ep7.el7.noarch.rpm SHA-256: df29925a0a7813dad1c461b7886cf88bda32304f499015c5dd450937bc5858e1
mod_jk-ap24-1.2.40-8.redhat_1.ep7.el7.x86_64.rpm SHA-256: f107e723eb692f75aadfefb2254ac71e9ff270f1e863024721fa550f56b01f1d
mod_jk-debuginfo-1.2.40-8.redhat_1.ep7.el7.x86_64.rpm SHA-256: 6d1bf95016b69fd8d762bf629964a642b2d2673d3e830db310013bbdb6066459
mod_jk-manual-1.2.40-8.redhat_1.ep7.el7.x86_64.rpm SHA-256: e2e763bcc46c6057a45f7047924476c0c7205730367279af22302cb2d1dd8586
mod_security-jws3-2.8.0-6.GA.ep7.el7.x86_64.rpm SHA-256: 27be304f89e69cca200b2c4708c4186948a8cb7b3de9ee2797ed1e2e0818c383
mod_security-jws3-debuginfo-2.8.0-6.GA.ep7.el7.x86_64.rpm SHA-256: cd3b720ce2f6ab420c00cb7cc2588522923b0eba199e826806aa533b5b263716
tomcat7-7.0.59-26_patch_00.ep7.el7.noarch.rpm SHA-256: e3de24956eb00b70126f4af82bf4b4fd365eb06da56d1010c17cf3115f8b48e6
tomcat7-admin-webapps-7.0.59-26_patch_00.ep7.el7.noarch.rpm SHA-256: edcdbb94f3e08dcf5afffbf6bf4c3474ce6a51035e13373bf54390dca6040269
tomcat7-docs-webapp-7.0.59-26_patch_00.ep7.el7.noarch.rpm SHA-256: 65eafd66c68385cfeca8a9a4e2a9c43f18a10b74309e3b810307c601fbc52c13
tomcat7-el-2.2-api-7.0.59-26_patch_00.ep7.el7.noarch.rpm SHA-256: 55f2350b98e8dcebe2f819d0cb09eb984a73ff3448596428136373027da6c711
tomcat7-javadoc-7.0.59-26_patch_00.ep7.el7.noarch.rpm SHA-256: bac0a1cf27a95df33dfd31ac427b0a6211d3d02643de46bc66ad468f0fe4626b
tomcat7-jsp-2.2-api-7.0.59-26_patch_00.ep7.el7.noarch.rpm SHA-256: de2c1cf81cd7947f77f4428e0a0c6bbeee7d9565011b86a37343e5c09243ea81
tomcat7-lib-7.0.59-26_patch_00.ep7.el7.noarch.rpm SHA-256: 4d3f4912789347248cd80a187fad09627c728d33f161e74569aafc3cad881c23
tomcat7-log4j-7.0.59-26_patch_00.ep7.el7.noarch.rpm SHA-256: 974b969ea70808688b9a551c2b06c2acdb96772ffcb32a7ed3f2e9e2e02f0bb7
tomcat7-servlet-3.0-api-7.0.59-26_patch_00.ep7.el7.noarch.rpm SHA-256: 9c3c6db515b15ec82d932db7863ddcb52214fe1d95aecafd2982146cb2087083
tomcat7-webapps-7.0.59-26_patch_00.ep7.el7.noarch.rpm SHA-256: f060e2ca85d0189e3e8f055973b41f8aeb0e9d8a2123c171f2f5307e5d731d84
tomcat8-8.0.18-25_patch_00.ep7.el7.noarch.rpm SHA-256: db9065fd875ca959d7db1bfbe188ecd239688815afcb4a8ac3cfc377840de089
tomcat8-admin-webapps-8.0.18-25_patch_00.ep7.el7.noarch.rpm SHA-256: ac1160fc19f8b5ab24d9930ea3af0f48cb55e478e216bd0fc3f34d866c624e03
tomcat8-docs-webapp-8.0.18-25_patch_00.ep7.el7.noarch.rpm SHA-256: 1eeaf8d018c18f17e5100ad78a4d46c26259741aa9b40732857c63af7ce9322c
tomcat8-el-2.2-api-8.0.18-25_patch_00.ep7.el7.noarch.rpm SHA-256: 83a4acf0376a3fcf9eb1e146adae4b3d85934a046ce1724022456618799bc3f4
tomcat8-javadoc-8.0.18-25_patch_00.ep7.el7.noarch.rpm SHA-256: 49f6d50bf8e7f7aaa664bafadb3f61f307b3168c5126f5507c6cb120d86f5529
tomcat8-jsp-2.3-api-8.0.18-25_patch_00.ep7.el7.noarch.rpm SHA-256: b5ef0bb52fef9dd6922bbfd0fea26bd999b07f1dedea5ea08fe30e09cd95f508
tomcat8-lib-8.0.18-25_patch_00.ep7.el7.noarch.rpm SHA-256: f98fe1b06e81c80a600df9a55953b67239092aff5910edfb8b10424e2b59999f
tomcat8-log4j-8.0.18-25_patch_00.ep7.el7.noarch.rpm SHA-256: 3e1c01ed30623387d570bbe3fe2b35cbf636228c2cd7b308be974c86a2e95264
tomcat8-servlet-3.1-api-8.0.18-25_patch_00.ep7.el7.noarch.rpm SHA-256: 3ff82a00e2cc7c251cfe2b9297c26ae52f89c9ffad37ad64d8ba41091604dbad
tomcat8-webapps-8.0.18-25_patch_00.ep7.el7.noarch.rpm SHA-256: ddc4bdf6e1750378bbfa9fa32a24fa67905f3c8cde28a03051d67e1d17432120

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility