Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2021:2561 - Security Advisory
Issued:
2021-06-29
Updated:
2021-06-29

RHSA-2021:2561 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: Red Hat JBoss Web Server 5.5.0 Security release

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated Red Hat JBoss Web Server 5.5.0 packages are now available for Red Hat Enterprise Linux 7, and Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this release as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.

This release of Red Hat JBoss Web Server 5.5.0 serves as a replacement for Red Hat JBoss Web Server 5.4.2, and includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References.

Security Fix(es):

  • hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used (CVE-2020-25638)
  • tomcat: Request mix-up with h2c (CVE-2021-25122)
  • tomcat: Incomplete fix for CVE-2020-9484 (RCE via session persistence) (CVE-2021-25329)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • JBoss Enterprise Web Server 5 for RHEL 8 x86_64
  • JBoss Enterprise Web Server 5 for RHEL 7 x86_64

Fixes

  • BZ - 1881353 - CVE-2020-25638 hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used
  • BZ - 1934032 - CVE-2021-25122 tomcat: Request mix-up with h2c
  • BZ - 1934061 - CVE-2021-25329 tomcat: Incomplete fix for CVE-2020-9484 (RCE via session persistence)

CVEs

  • CVE-2020-25638
  • CVE-2021-25122
  • CVE-2021-25329

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

JBoss Enterprise Web Server 5 for RHEL 8

SRPM
jws5-ecj-4.12.0-3.redhat_2.2.el8jws.src.rpm SHA-256: 383ea326336109c00a4ae51aea875347cf522dda969135b3b678d121c63ca48b
jws5-mod_cluster-1.4.3-2.Final_redhat_00002.1.el8jws.src.rpm SHA-256: a2282b903e4d20845b1e1d9abaae402bd2b820d2dc0f91d85cfbb77f1d7379cf
jws5-tomcat-9.0.43-11.redhat_00011.1.el8jws.src.rpm SHA-256: 0bc2bad5de3b8c6b3566b64763d4b73f311a0849010919ec3edfb9fe3d06fb1d
jws5-tomcat-native-1.2.26-3.redhat_3.el8jws.src.rpm SHA-256: a535e5165e6808c344c3e541e524efae450a2d7708ce91295f191a27e87e5cbe
jws5-tomcat-vault-1.1.8-2.Final_redhat_00003.1.el8jws.src.rpm SHA-256: c6a51e9110047372e08387822ac37be9f59217516b45b7f76ff9a9edf5f5306a
x86_64
jws5-ecj-4.12.0-3.redhat_2.2.el8jws.noarch.rpm SHA-256: 3dab47d553ff987f7e8424b8852ed9445fc00451c8f6dfdc17a00bb96a01bf6d
jws5-mod_cluster-1.4.3-2.Final_redhat_00002.1.el8jws.noarch.rpm SHA-256: 8669fb21d25521bcd2987043d3451b4a9da0e9bc706c4e293b6c5a2995be62aa
jws5-mod_cluster-tomcat-1.4.3-2.Final_redhat_00002.1.el8jws.noarch.rpm SHA-256: 174af350a28568935ebb430e4accad4a89cc0517173e1b5a257da13e3830a9d6
jws5-tomcat-9.0.43-11.redhat_00011.1.el8jws.noarch.rpm SHA-256: 1ed71cf27c2193e3cc08a5fcc2f59ac2868ffe3cdf144ca1a8a130247ed8d598
jws5-tomcat-admin-webapps-9.0.43-11.redhat_00011.1.el8jws.noarch.rpm SHA-256: b592157aeac3408b545cf26620c55aff96056ca2a057b9afb02652aa714efdf2
jws5-tomcat-docs-webapp-9.0.43-11.redhat_00011.1.el8jws.noarch.rpm SHA-256: 86b18f3dd75da057215a5cf2ed58a9caa9ee1cceeb74ebee0e36677eca29e850
jws5-tomcat-el-3.0-api-9.0.43-11.redhat_00011.1.el8jws.noarch.rpm SHA-256: 784b13b62575bd4ad0210c810d7dbe9b56a609d8c0f6b173ba1ede2ac9f6f279
jws5-tomcat-javadoc-9.0.43-11.redhat_00011.1.el8jws.noarch.rpm SHA-256: 98c02989c34bedd88a53809d9013ce57e923d721765e5288fce97960cbbbb2e3
jws5-tomcat-jsp-2.3-api-9.0.43-11.redhat_00011.1.el8jws.noarch.rpm SHA-256: 1c2c179f9178e4ecbe078a0761dd449cdeeb933c1e0bd50f4af9e379d2870856
jws5-tomcat-lib-9.0.43-11.redhat_00011.1.el8jws.noarch.rpm SHA-256: 85b0b8751eb4fbee5ebbd3e63fce7799bb9dac43fcde4c356c5ee6b35aebbcec
jws5-tomcat-native-1.2.26-3.redhat_3.el8jws.x86_64.rpm SHA-256: 1f46779b48008bc4df61341cfaf6c22d673ad536701b943cf8ccc2728f694339
jws5-tomcat-native-debuginfo-1.2.26-3.redhat_3.el8jws.x86_64.rpm SHA-256: d57b9c1c2076f4af9b8c1d65881806cfe456323471a4676674693d0dbce0cc6f
jws5-tomcat-selinux-9.0.43-11.redhat_00011.1.el8jws.noarch.rpm SHA-256: c7a72a1076a7c7bc3ce02867de9a10e97b514a7cdae524a7479842b15646bd3f
jws5-tomcat-servlet-4.0-api-9.0.43-11.redhat_00011.1.el8jws.noarch.rpm SHA-256: beb1c1f0b3d574a67bbc333decb32102a10f762a7b386c718f3a15d5f97828a4
jws5-tomcat-vault-1.1.8-2.Final_redhat_00003.1.el8jws.noarch.rpm SHA-256: 9c7d56cb9636d846e425d4d14ed6bda126d7b04e021f0c8c91b4454aa6022279
jws5-tomcat-vault-javadoc-1.1.8-2.Final_redhat_00003.1.el8jws.noarch.rpm SHA-256: e0aaa4d1cc08dc62e62ce6ea36356cdf927d16471bd5de91588d6f77039f1332
jws5-tomcat-webapps-9.0.43-11.redhat_00011.1.el8jws.noarch.rpm SHA-256: d4f37d77831de0b2eaf6bd09e5122299df7a3316da25258f164fabb4c90aef4d

JBoss Enterprise Web Server 5 for RHEL 7

SRPM
jws5-ecj-4.12.0-3.redhat_2.2.el7jws.src.rpm SHA-256: c51b5676b2ca29e332182f550d8d488f5dc5286546c877337e552bbb451ad986
jws5-mod_cluster-1.4.3-2.Final_redhat_00002.1.el7jws.src.rpm SHA-256: 7823d5fa85b42c30c7cf833dfcdfa627baadb23f94eb3ece7937cdd6342afde5
jws5-tomcat-9.0.43-11.redhat_00011.1.el7jws.src.rpm SHA-256: de6eededf7c46ae20cda103c346ca62a0ae998b4b8fac86ef2571b2de86b2849
jws5-tomcat-native-1.2.26-3.redhat_3.el7jws.src.rpm SHA-256: 52e43fb30248957304544cc6015766c5a2711f5432d65f19d9ef7431856bbb69
jws5-tomcat-vault-1.1.8-2.Final_redhat_00003.1.el7jws.src.rpm SHA-256: 2593d1cc71cb61449c328c9f026ce1d3fdd8243ee9c54d83e89892db70a458c4
x86_64
jws5-ecj-4.12.0-3.redhat_2.2.el7jws.noarch.rpm SHA-256: c9d7bdd810aea2988cf7efb74377c656ac6210f0e0cb801a724ea64ab93f56be
jws5-mod_cluster-1.4.3-2.Final_redhat_00002.1.el7jws.noarch.rpm SHA-256: ca2de186e564cedb88822571e581f38ac1690e5be32d129e270cbe9ae93308ed
jws5-mod_cluster-tomcat-1.4.3-2.Final_redhat_00002.1.el7jws.noarch.rpm SHA-256: bd798430e2ae4a14b23f849a3d3b9817dab45c4018c44f21ad4014c9ecbf8123
jws5-tomcat-9.0.43-11.redhat_00011.1.el7jws.noarch.rpm SHA-256: 0716db5d9959ba64b024ad5d46a36b9d957790f8f8f24bb6d2d0e65623874397
jws5-tomcat-admin-webapps-9.0.43-11.redhat_00011.1.el7jws.noarch.rpm SHA-256: 54080a6979d5e1fa734a89ae2a8f4c8092e1a2e04c7eb64eff727f825716cc3c
jws5-tomcat-docs-webapp-9.0.43-11.redhat_00011.1.el7jws.noarch.rpm SHA-256: 5d314a4cbd80b7701b8bbc6658a7f21c802541dc6d5850e8f94401697c1af22e
jws5-tomcat-el-3.0-api-9.0.43-11.redhat_00011.1.el7jws.noarch.rpm SHA-256: 3a0647fe8d7682683fcbefc5121f16f4f4d3ea1c9b71c0dc4ec53afb1777492f
jws5-tomcat-java-jdk11-9.0.43-11.redhat_00011.1.el7jws.noarch.rpm SHA-256: b518058d5f4429663e6493dbc94b92cd5ceb01032a5f7113fa2c3bbecab54070
jws5-tomcat-java-jdk8-9.0.43-11.redhat_00011.1.el7jws.noarch.rpm SHA-256: c2cb9e89e1e5b59e2a240c8509aaefd534a6d782bb729405a4f238dfdb4e57c7
jws5-tomcat-javadoc-9.0.43-11.redhat_00011.1.el7jws.noarch.rpm SHA-256: bb224093fd1b62dacbb0bb0a786a270f9768c9aa3d9a4cbae5141abb4606375b
jws5-tomcat-jsp-2.3-api-9.0.43-11.redhat_00011.1.el7jws.noarch.rpm SHA-256: 10fb7979f4980695aa31fd18692f6e16ba13f988d592f10ba539a8060c9a5159
jws5-tomcat-lib-9.0.43-11.redhat_00011.1.el7jws.noarch.rpm SHA-256: 6d9b19ab22086dd5ee53bc033964754f19902a6c40b2466f11420775987ab81d
jws5-tomcat-native-1.2.26-3.redhat_3.el7jws.x86_64.rpm SHA-256: 45ba505f0970f4d9f50d4f7b0d0bd308e11c1e6095a5d1caab2dee7b5ccc0752
jws5-tomcat-native-debuginfo-1.2.26-3.redhat_3.el7jws.x86_64.rpm SHA-256: 5124be8f7510ec583498d243afe9c7e1ffcc11dab47e6c71d045f63510c9883b
jws5-tomcat-selinux-9.0.43-11.redhat_00011.1.el7jws.noarch.rpm SHA-256: ceefc4e4f93199c58fae3a230fff9681ce106ca4c2ae1c77c16e33981ede6fda
jws5-tomcat-servlet-4.0-api-9.0.43-11.redhat_00011.1.el7jws.noarch.rpm SHA-256: 49958f4d61526907ea09e37bac6c4378b32da91e1d11aa9dd1e6a192fabdef90
jws5-tomcat-vault-1.1.8-2.Final_redhat_00003.1.el7jws.noarch.rpm SHA-256: eb82f8c4dc94a109f21537c5052601c37ed2632dacac1d0bc7c1693b217be702
jws5-tomcat-vault-javadoc-1.1.8-2.Final_redhat_00003.1.el7jws.noarch.rpm SHA-256: 4d2e5688332785556e2a1943847854aa215c683980ed9d7b1179dc5b26ebcafa
jws5-tomcat-webapps-9.0.43-11.redhat_00011.1.el7jws.noarch.rpm SHA-256: 3ca74e503a91b74105513841ef1488299be22b4d5d73ebf2ef419f7a66aedb92

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility