Package tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch
Name | tomcat-servlet-4.0-api |
---|---|
Epoch | 1 |
Version | 9.0.87 |
Release | 3.el9_6.1 |
Architecture | noarch |
Website/URL | http://tomcat.apache.org/ |
License | ASL 2.0 |
Build Time | 2025-07-17 09:05:17 |
Build Host | builder-arm64-1.inferitos.ru |
Summary | Apache Tomcat Java Servlet v4.0 API Implementation Classes |
Repositories | AppStream |
Description | Apache Tomcat Servlet API Implementation Classes. |
Errata | INFSA-2025:11335 |
Size | 284 KiB |
Source Project | tomcat-9.0.87-3.el9_6.1 |
SHA-256 checksum | 7b8b094a202c34fc9decbba34c2f05c7230e079fda5136a0f8b2fc9f0ba85708 |
×
* Mon May 26 2025 Adam Krajcik <akrajcik@redhat.com> - 1:9.0.87-3.el9_6.1 - Resolves: RHEL-91765 tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650) - Resolves: RHEL-71981 tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337) * Tue Apr 08 2025 Adam Krajcik <akrajcik@redhat.com> - 1:9.0.87-3 - Resolves: RHEL-82945 tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT (CVE-2025-24813) - Resolves: RHEL-71723 tomcat: RCE due to TOCTOU issue in JSP compilation (CVE-2024-50379) * Thu Aug 08 2024 Adam Krajcik <akrajcik@redhat.com> - 1:9.0.87-2 - Resolves: RHEL-46163 tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750) - Resolves: RHEL-18245 - OpenJDK 21 support for RHEL Tomcat * Fri May 03 2024 Sokratis Zappis <szappis@redhat.com> - 1:9.0.87-1 - Resolves: RHEL-35812 - Rebase tomcat to version 9.0.87 - Resolves: RHEL-29257 tomcat: Apache Tomcat: WebSocket DoS with incomplete closing handshake (CVE-2024-23672) - Resolves: RHEL-29252 tomcat: : Apache Tomcat: HTTP/2 header handling DoS (CVE-2024-24549) - Resolves: RHEL-53001 - Amend tomcat's changelog (CVE-2023-46589, CVE-2023-45648, CVE-2023-42795, CVE-2023-42794, CVE-2023-44487, CVE-2023-41080) * Thu Jan 18 2024 Hui Wang <huwang@redhat.com> - 1:9.0.62-39 - Resolves: RHEL-17605 tomcat: HTTP request smuggling via malformed trailer headers (CVE-2023-46589) * Thu Nov 23 2023 Hui Wang <huwang@redhat.com> - 1:9.0.62-38 - Resolves: RHEL-13908 tomcat: incorrectly parsed http trailer headers can cause request smuggling (CVE-2023-45648) - Resolves: RHEL-13905 tomcat: improper cleaning of recycled objects could lead to information leak (CVE-2023-42795) - Resolves: RHEL-12952 tomcat: FileUpload: DoS due to accumulation of temporary files on Windows (CVE-2023-42794) - Resolves: RHEL-12552 tomcat: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487) - Resolves: RHEL-2388 tomcat: Open Redirect vulnerability in FORM authentication (CVE-2023-41080) * Fri Oct 13 2023 Hui Wang <huwang@redhat.com> - 1:9.0.62-37 - Resolves: RHEL-12551 tomcat: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487) - Remove JDK subpackges which are unused * Fri Aug 25 2023 Coty Sutherland <csutherl@redhat.com> - 1:9.0.62-16 - Related: #2184133 Declare file conflicts * Fri Aug 25 2023 Coty Sutherland <csutherl@redhat.com> - 1:9.0.62-15 - Resolves: #2184133 Fix bug in Obsoletes * Tue Aug 01 2023 Hui Wang <huwang@redhat.com> - 1:9.0.62-14 - Resolves: #2210632 CVE-2023-28709 tomcat