You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa tomcat

Sigurnosni nedostatak programskog paketa tomcat

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2020-d9169235a8
2020-06-23 01:18:52.077388
——————————————————————————–

Name : tomcat
Product : Fedora 32
Version : 9.0.36
Release : 1.fc32
URL : http://tomcat.apache.org/
Summary : Apache Servlet/JSP Engine, RI for Servlet 4.0/JSP 2.3 API
Description :
Tomcat is the servlet container that is used in the official Reference
Implementation for the Java Servlet and JavaServer Pages technologies.
The Java Servlet and JavaServer Pages specifications are developed by
Sun under the Java Community Process.

Tomcat is developed in an open and participatory environment and
released under the Apache Software License version 2.0. Tomcat is intended
to be a collaboration of the best-of-breed developers from around the world.

——————————————————————————–
Update Information:

This update includes a rebase from 9.0.34 up to 9.0.36 which resolves one CVE
along with various other bugs/features: * rhbz#1838964 CVE-2020-9484 tomcat:
Apache Tomcat Remote Code Execution via session persistence [fedora-all] *
rhbz#1844885 tomcat-9.0.36 is available
——————————————————————————–
ChangeLog:

* Wed Jun 10 2020 Hui Wang <huwang@redhat.com> – 1:9.0.36-1
– Upgrade to 9.0.36
* Sun May 31 2020 Hui Wang <huwang@redhat.com> – 1:9.0.35-2
– Upgrade to 9.0.35
——————————————————————————–
References:

[ 1 ] Bug #1838964 – CVE-2020-9484 tomcat: deserialization flaw in session persistence storage leading to RCE [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1838964
[ 2 ] Bug #1844885 – tomcat-9.0.36 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1844885
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-d9169235a8’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

 

--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2020-ce396e7d5c
2020-06-23 01:12:06.465345
--------------------------------------------------------------------------------

Name        : tomcat
Product     : Fedora 31
Version     : 9.0.36
Release     : 1.fc31
URL         : http://tomcat.apache.org/
Summary     : Apache Servlet/JSP Engine, RI for Servlet 4.0/JSP 2.3 API
Description :
Tomcat is the servlet container that is used in the official Reference
Implementation for the Java Servlet and JavaServer Pages technologies.
The Java Servlet and JavaServer Pages specifications are developed by
Sun under the Java Community Process.

Tomcat is developed in an open and participatory environment and
released under the Apache Software License version 2.0. Tomcat is intended
to be a collaboration of the best-of-breed developers from around the world.

--------------------------------------------------------------------------------
Update Information:

This update includes a rebase from 9.0.34 up to 9.0.36 which resolves one CVE
along with various other bugs/features:  * rhbz#1838964  CVE-2020-9484 tomcat:
Apache Tomcat Remote Code Execution via session persistence [fedora-all] *
rhbz#1844885 tomcat-9.0.36 is available
--------------------------------------------------------------------------------
ChangeLog:

* Wed Jun 10 2020 Hui Wang <huwang@redhat.com> - 1:9.0.36-1
- Upgrade to 9.0.36
* Sun May 31 2020 Hui Wang <huwang@redhat.com> - 1:9.0.35-2
- Upgrade to 9.0.35
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1838964 - CVE-2020-9484 tomcat: deserialization flaw in session persistence storage leading to RCE [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1838964
  [ 2 ] Bug #1844885 - tomcat-9.0.36 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=1844885
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2020-ce396e7d5c' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org</huwang@redhat.com></huwang@redhat.com>
AutorGoran Culibrk
Cert idNCERT-REF-2020-06-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa php7

Otkriven je sigurnosni nedostatak u programskom paketu php7 za operacijski sustav Suse. Otkriveni nedostatak potencijalnim napadačima omogućuje izazivanje DoS stanja....

Close