Пакет tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch
Имя | tomcat-jsp-2.3-api |
---|---|
Эпоха | 1 |
Версия | 9.0.87 |
Релиз | 3.el9_6.1 |
Архитектура | noarch |
Сайт | http://tomcat.apache.org/ |
Лицензия | ASL 2.0 |
Время сборки | 2025-07-17 09:05:17 |
Хост сборки | builder-arm64-1.inferitos.ru |
Краткое описание | Apache Tomcat JavaServer Pages v2.3 API Implementation Classes |
Репозитории | AppStream |
Полное описание | Apache Tomcat JSP API Implementation Classes. |
Эррата | INFSA-2025:11335 |
Размер | 72 КиБ |
Исходный проект | tomcat-9.0.87-3.el9_6.1 |
Контрольная сумма SHA-256 | 6bb570647ebfc0450bf3cc7e8e86c2c6abab9ed5760e18a9e51ae0e3dd17ac19 |
×
* Mon May 26 2025 Adam Krajcik <akrajcik@redhat.com> - 1:9.0.87-3.el9_6.1 - Resolves: RHEL-91765 tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650) - Resolves: RHEL-71981 tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337) * Tue Apr 08 2025 Adam Krajcik <akrajcik@redhat.com> - 1:9.0.87-3 - Resolves: RHEL-82945 tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT (CVE-2025-24813) - Resolves: RHEL-71723 tomcat: RCE due to TOCTOU issue in JSP compilation (CVE-2024-50379) * Thu Aug 08 2024 Adam Krajcik <akrajcik@redhat.com> - 1:9.0.87-2 - Resolves: RHEL-46163 tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750) - Resolves: RHEL-18245 - OpenJDK 21 support for RHEL Tomcat * Fri May 03 2024 Sokratis Zappis <szappis@redhat.com> - 1:9.0.87-1 - Resolves: RHEL-35812 - Rebase tomcat to version 9.0.87 - Resolves: RHEL-29257 tomcat: Apache Tomcat: WebSocket DoS with incomplete closing handshake (CVE-2024-23672) - Resolves: RHEL-29252 tomcat: : Apache Tomcat: HTTP/2 header handling DoS (CVE-2024-24549) - Resolves: RHEL-53001 - Amend tomcat's changelog (CVE-2023-46589, CVE-2023-45648, CVE-2023-42795, CVE-2023-42794, CVE-2023-44487, CVE-2023-41080) * Thu Jan 18 2024 Hui Wang <huwang@redhat.com> - 1:9.0.62-39 - Resolves: RHEL-17605 tomcat: HTTP request smuggling via malformed trailer headers (CVE-2023-46589) * Thu Nov 23 2023 Hui Wang <huwang@redhat.com> - 1:9.0.62-38 - Resolves: RHEL-13908 tomcat: incorrectly parsed http trailer headers can cause request smuggling (CVE-2023-45648) - Resolves: RHEL-13905 tomcat: improper cleaning of recycled objects could lead to information leak (CVE-2023-42795) - Resolves: RHEL-12952 tomcat: FileUpload: DoS due to accumulation of temporary files on Windows (CVE-2023-42794) - Resolves: RHEL-12552 tomcat: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487) - Resolves: RHEL-2388 tomcat: Open Redirect vulnerability in FORM authentication (CVE-2023-41080) * Fri Oct 13 2023 Hui Wang <huwang@redhat.com> - 1:9.0.62-37 - Resolves: RHEL-12551 tomcat: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487) - Remove JDK subpackges which are unused * Fri Aug 25 2023 Coty Sutherland <csutherl@redhat.com> - 1:9.0.62-16 - Related: #2184133 Declare file conflicts * Fri Aug 25 2023 Coty Sutherland <csutherl@redhat.com> - 1:9.0.62-15 - Resolves: #2184133 Fix bug in Obsoletes * Tue Aug 01 2023 Hui Wang <huwang@redhat.com> - 1:9.0.62-14 - Resolves: #2210632 CVE-2023-28709 tomcat