Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/jws5-tomcat@9.0.43-13.redhat_00013.1?arch=el7jws
purl pkg:rpm/redhat/jws5-tomcat@9.0.43-13.redhat_00013.1?arch=el7jws
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.0
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-dy6m-zt6r-9ubd
Aliases:
CVE-2021-41079
GHSA-59g9-7gfx-c72p
Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an infinite loop resulting in a denial of service. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T14:01:24.790952+00:00 RedHat Importer Affected by VCID-dy6m-zt6r-9ubd https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41079.json 38.0.0