[ All 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Project tomcat-1:9.0.87-6.el9

Name tomcat
Epoch 1
Version 9.0.87
Release 6.el9
Website/URL http://tomcat.apache.org/
License ASL 2.0
Build Time 2025-10-23 20:49:18
Build Host builder-x86-03.inferitos.ru
Summary Apache Servlet/JSP Engine, RI for Servlet 4.0/JSP 2.3 API
Repositories AppStream
Description Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world.
Errata
× Full screenshot
Packages link
Package Summary SHA-256 checksum
noarch
tomcat-1:9.0.87-6.el9.noarch Apache Servlet/JSP Engine, RI for Servlet 4.0/JSP 2.3 API 5fbccc7903eacecf58dd3b291254e2eb34d25b0abcf0c7a6096343d8808d0bc2 download
tomcat-admin-webapps-1:9.0.87-6.el9.noarch The host-manager and manager web applications for Apache Tomcat 0a251f36659f411e64816d3423918137d76fc0aa5f0eaa938865b31ec820af59 download
tomcat-docs-webapp-1:9.0.87-6.el9.noarch The docs web application for Apache Tomcat 992bd86efeb85f9fd67b059cea2feb07a96d1267b568d85ef9777e096e90f186 download
tomcat-el-3.0-api-1:9.0.87-6.el9.noarch Apache Tomcat Expression Language v3.0 API Implementation Classes 4ba3b1c4bb68ed1807dcabac0840c839d689071bceccc05276b06f71d155d456 download
tomcat-jsp-2.3-api-1:9.0.87-6.el9.noarch Apache Tomcat JavaServer Pages v2.3 API Implementation Classes fea4a93573f0be2943983cc51c9f79d8ab390ae6ad4d142b01b996c37c6641c7 download
tomcat-lib-1:9.0.87-6.el9.noarch Libraries needed to run the Tomcat Web container e614432da12a6294d0f1aec787f19d632088e3d20872282c41079d10b7c0f9d6 download
tomcat-servlet-4.0-api-1:9.0.87-6.el9.noarch Apache Tomcat Java Servlet v4.0 API Implementation Classes b221c4155082d89bb501e2db7855f8083f1630950e1d72dd12366bf0669bb8e9 download
tomcat-webapps-1:9.0.87-6.el9.noarch The ROOT web application for Apache Tomcat e5876d8723a62df0a754b1d1404eff2f7e1524519b37765e900c6473f295360b download
src
tomcat-1:9.0.87-6.el9.src Apache Servlet/JSP Engine, RI for Servlet 4.0/JSP 2.3 API fbc080700239abd2b4ea03513f613928efb113067d905b300cb57df1ab52ff60 download
Changelog link
* Thu Aug 14 2025 Adam Krajcik <akrajcik@redhat.com> - 1:9.0.87-6
- Resolves: RHEL-102201
  tomcat: http/2 "MadeYouReset" DoS attack through HTTP/2 control frames (CVE-2025-48989)

* Tue Aug 12 2025 Adam Krajcik <akrajcik@redhat.com> - 1:9.0.87-5
- Resolves: RHEL-108489
  tomcat: Apache Commons FileUpload DOS via part headers (CVE-2025-48976)
- Resolves: RHEL-108497
  tomcat: Dos in multipart upload (CVE-2025-48988)
- Resolves: RHEL-108505
  tomcat: Security constraint bypass for pre/post-resources (CVE-2025-49125)
- Resolves: RHEL-108513
  tomcat: Denial of service (CVE-2025-52434)
- Resolves: RHEL-108529
  tomcat: Denial of service (CVE-2025-52520)
- Resolves: RHEL-108523
  tomcat: Denial of service (CVE-2025-53506)

* Mon Jul 21 2025 Adam Krajcik <akrajcik@redhat.com> - 1:9.0.87-4
- Resolves: RHEL-91763
  tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650)
- Resolves: RHEL-71985
  tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337)

* Tue Apr 08 2025 Adam Krajcik <akrajcik@redhat.com> - 1:9.0.87-3
- Resolves: RHEL-82945
  tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT (CVE-2025-24813)
- Resolves: RHEL-71723
  tomcat: RCE due to TOCTOU issue in JSP compilation (CVE-2024-50379)

* Thu Aug 08 2024 Adam Krajcik <akrajcik@redhat.com> - 1:9.0.87-2
- Resolves: RHEL-46163
  tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750)
- Resolves: RHEL-18245 - OpenJDK 21 support for RHEL Tomcat

* Fri May 03 2024 Sokratis Zappis <szappis@redhat.com> - 1:9.0.87-1
- Resolves: RHEL-35812 - Rebase tomcat to version 9.0.87
- Resolves: RHEL-29257
  tomcat: Apache Tomcat: WebSocket DoS with incomplete closing handshake (CVE-2024-23672)
- Resolves: RHEL-29252
  tomcat: : Apache Tomcat: HTTP/2 header handling DoS (CVE-2024-24549)
- Resolves: RHEL-53001 - Amend tomcat's changelog
  (CVE-2023-46589, CVE-2023-45648, CVE-2023-42795, CVE-2023-42794, CVE-2023-44487, CVE-2023-41080)

* Thu Jan 18 2024 Hui Wang <huwang@redhat.com> - 1:9.0.62-39
- Resolves: RHEL-17605
  tomcat: HTTP request smuggling via malformed trailer headers (CVE-2023-46589)

* Thu Nov 23 2023 Hui Wang <huwang@redhat.com> - 1:9.0.62-38
- Resolves: RHEL-13908
  tomcat: incorrectly parsed http trailer headers can cause request smuggling (CVE-2023-45648)
- Resolves: RHEL-13905
  tomcat: improper cleaning of recycled objects could lead to information leak (CVE-2023-42795)
- Resolves: RHEL-12952
  tomcat: FileUpload: DoS due to accumulation of temporary files on Windows (CVE-2023-42794)
- Resolves: RHEL-12552
  tomcat: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)
- Resolves: RHEL-2388
  tomcat: Open Redirect vulnerability in FORM authentication (CVE-2023-41080)

* Fri Oct 13 2023 Hui Wang <huwang@redhat.com> - 1:9.0.62-37
- Resolves: RHEL-12551
  tomcat: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)
- Remove JDK subpackges which are unused

* Fri Aug 25 2023 Coty Sutherland <csutherl@redhat.com> - 1:9.0.62-16
- Related: #2184133 Declare file conflicts