{"id":"RHSA-2017:0456","summary":"Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 security and enhancement update","modified":"2026-03-18T10:01:51Z","published":"2024-09-29T17:09:27Z","upstream":["CVE-2016-0762","CVE-2016-1240","CVE-2016-3092","CVE-2016-5018","CVE-2016-6325","CVE-2016-6794","CVE-2016-6796","CVE-2016-6797","CVE-2016-6816","CVE-2016-8735","CVE-2016-8745"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:0456"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1349468"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1367447"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1376712"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1390493"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1390515"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1390520"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1390525"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1390526"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1397484"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1397485"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1403824"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JWS-268"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0456.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0762"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0762"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0762"},{"type":"ARTICLE","url":"https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47"},{"type":"ARTICLE","url":"https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72"},{"type":"ARTICLE","url":"https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1240"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1240"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1240"},{"type":"ARTICLE","url":"http://legalhackers.com/advisories/Tomcat-DebPkgs-Root-Privilege-Escalation-Exploit-CVE-2016-1240.txt"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3092"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3092"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3092"},{"type":"ARTICLE","url":"http://tomcat.apache.org/security-7.html"},{"type":"ARTICLE","url":"http://tomcat.apache.org/security-8.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5018"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5018"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5018"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6325"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6325"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6325"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6794"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6794"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6794"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6796"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6796"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6796"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6797"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6797"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6797"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6816"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6816"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6816"},{"type":"ARTICLE","url":"https://access.redhat.com/articles/2991951"},{"type":"ARTICLE","url":"https://access.redhat.com/solutions/2891171"},{"type":"ARTICLE","url":"https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48"},{"type":"ARTICLE","url":"https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73"},{"type":"ARTICLE","url":"https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39"},{"type":"ARTICLE","url":"https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-8735"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-8735"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8735"},{"type":"ARTICLE","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-8745"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-8745"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8745"},{"type":"ARTICLE","url":"https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.49"},{"type":"ARTICLE","url":"https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.74"},{"type":"ARTICLE","url":"https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.40"},{"type":"ARTICLE","url":"https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.9"}],"affected":[{"package":{"name":"hibernate4-c3p0-eap6","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/hibernate4-c3p0-eap6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.2.23-1.Final_redhat_1.1.ep6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"hibernate4-core-eap6","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/hibernate4-core-eap6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.2.23-1.Final_redhat_1.1.ep6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"hibernate4-eap6","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/hibernate4-eap6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.2.23-1.Final_redhat_1.1.ep6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"hibernate4-entitymanager-eap6","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/hibernate4-entitymanager-eap6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.2.23-1.Final_redhat_1.1.ep6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"hibernate4-envers-eap6","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/hibernate4-envers-eap6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.2.23-1.Final_redhat_1.1.ep6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"jbcs-httpd24-apache-commons-daemon","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.15-1.redhat_2.1.jbcs.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"jbcs-httpd24-apache-commons-daemon-jsvc","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon-jsvc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.0.15-17.redhat_2.jbcs.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.0.15-17.redhat_2.jbcs.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"jbcs-httpd24-runtime","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/jbcs-httpd24-runtime"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1-3.jbcs.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"mod_cluster","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/mod_cluster"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.3.5-2.Final_redhat_2.1.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"mod_cluster-tomcat7","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/mod_cluster-tomcat7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.3.5-2.Final_redhat_2.1.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"mod_cluster-tomcat8","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/mod_cluster-tomcat8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.3.5-2.Final_redhat_2.1.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat-native","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat-native"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.2.8-9.redhat_9.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat-native-debuginfo","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat-native-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.2.8-9.redhat_9.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat-vault","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat-vault"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.8-9.Final_redhat_2.1.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat7","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.70-16.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat7-admin-webapps","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat7-admin-webapps"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.70-16.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat7-docs-webapp","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat7-docs-webapp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.70-16.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat7-el-2.2-api","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat7-el-2.2-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.70-16.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat7-javadoc","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat7-javadoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.70-16.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat7-jsp-2.2-api","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat7-jsp-2.2-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.70-16.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat7-jsvc","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat7-jsvc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.70-16.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat7-lib","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat7-lib"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.70-16.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat7-log4j","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat7-log4j"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.70-16.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat7-selinux","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat7-selinux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.70-16.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat7-servlet-3.0-api","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat7-servlet-3.0-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.70-16.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat7-webapps","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat7-webapps"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.70-16.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat8","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.36-17.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat8-admin-webapps","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat8-admin-webapps"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.36-17.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat8-docs-webapp","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat8-docs-webapp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.36-17.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat8-el-2.2-api","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat8-el-2.2-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.36-17.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat8-javadoc","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat8-javadoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.36-17.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat8-jsp-2.3-api","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat8-jsp-2.3-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.36-17.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat8-jsvc","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat8-jsvc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.36-17.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat8-lib","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat8-lib"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.36-17.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat8-log4j","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat8-log4j"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.36-17.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat8-selinux","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat8-selinux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.36-17.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat8-servlet-3.1-api","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat8-servlet-3.1-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.36-17.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}},{"package":{"name":"tomcat8-webapps","ecosystem":"Red Hat:jboss_enterprise_web_server:3.1::el7","purl":"pkg:rpm/redhat/tomcat8-webapps"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.36-17.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0456.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}