Login
Newsletter
Werbung

Sicherheit: Ausführen von Code mit höheren Privilegien in tomcat
Aktuelle Meldungen Distributionen
Name: Ausführen von Code mit höheren Privilegien in tomcat
ID: FEDORA-2022-1051064224
Distribution: Fedora
Plattformen: Fedora 36
Datum: Sa, 26. März 2022, 22:49
Referenzen: https://bugzilla.redhat.com/show_bug.cgi?id=1853928
https://bugzilla.redhat.com/show_bug.cgi?id=2007933
Applikationen: Apache Tomcat

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2022-1051064224
2022-03-26 14:56:28.657584
-------------------------------------------------------------------------------
-

Name : tomcat
Product : Fedora 36
Version : 9.0.59
Release : 3.fc36
URL : http://tomcat.apache.org/
Summary : Apache Servlet/JSP Engine, RI for Servlet 4.0/JSP 2.3 API
Description :
Tomcat is the servlet container that is used in the official Reference
Implementation for the Java Servlet and JavaServer Pages technologies.
The Java Servlet and JavaServer Pages specifications are developed by
Sun under the Java Community Process.

Tomcat is developed in an open and participatory environment and
released under the Apache Software License version 2.0. Tomcat is intended
to be a collaboration of the best-of-breed developers from around the world.

-------------------------------------------------------------------------------
-
Update Information:

I introduced an adjustment to the fix for rhbz#2061424 to ensure that it works
on all java versions rather than just Java 11. ---- This update includes a
rebase from 9.0.56 up to 9.0.59. * RHBZ#1853928 tomcat-9.0.59 is available
-------------------------------------------------------------------------------
-
ChangeLog:

* Thu Mar 10 2022 Coty Sutherland <csutherl@redhat.com> - 1:9.0.59-3
- Related: rhbz#2061424 Adjust fix so that it uses the proper env var
* Tue Mar 8 2022 Coty Sutherland <csutherl@redhat.com> - 1:9.0.59-2
- Resolves: rhbz#2061424 Add Java 9 start-up parameters to allow reflection
* Wed Mar 2 2022 Sonia Xu <sonix@amazon.com> - 1:9.0.59-1
- Update to 9.0.59
- Resolves: rhbz#2047419 - CVE-2022-23181 tomcat: local privilege escalation
vulnerability
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1853928 - tomcat-9.0.59 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1853928
[ 2 ] Bug #2007933 - Current tomcat fails with java.lang.NoSuchMethodError:
java.nio.ByteBuffer.clear() on JDK 1.8
https://bugzilla.redhat.com/show_bug.cgi?id=2007933
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-1051064224' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung