Описание
ELSA-2012-0474: tomcat5 security update (MODERATE)
[0:5.5.23-0jpp.31]
- Resolves: CVE-2012 regression. Changed patch file.
[0:5.5.23-0jpp.30]
- Resolves: CVE-2012-0022, CVE-2011-4858
[0:5.5.23-0jpp.27]
- Resolves CVE-2011-0013 rhbz 675933
- Resolves CVE-2011-3718 rhbz 675933
[0:5.5.23-0jpp.23]
- Resolves CVE-2011-1184 rhbz 744984
- Resolves CVE-2011-2204 rhbz 719188
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
tomcat5
5.5.23-0jpp.31.el5_8
tomcat5-admin-webapps
5.5.23-0jpp.31.el5_8
tomcat5-common-lib
5.5.23-0jpp.31.el5_8
tomcat5-jasper
5.5.23-0jpp.31.el5_8
tomcat5-jasper-javadoc
5.5.23-0jpp.31.el5_8
tomcat5-jsp-2.0-api
5.5.23-0jpp.31.el5_8
tomcat5-jsp-2.0-api-javadoc
5.5.23-0jpp.31.el5_8
tomcat5-server-lib
5.5.23-0jpp.31.el5_8
tomcat5-servlet-2.4-api
5.5.23-0jpp.31.el5_8
tomcat5-servlet-2.4-api-javadoc
5.5.23-0jpp.31.el5_8
tomcat5-webapps
5.5.23-0jpp.31.el5_8
Oracle Linux x86_64
tomcat5
5.5.23-0jpp.31.el5_8
tomcat5-admin-webapps
5.5.23-0jpp.31.el5_8
tomcat5-common-lib
5.5.23-0jpp.31.el5_8
tomcat5-jasper
5.5.23-0jpp.31.el5_8
tomcat5-jasper-javadoc
5.5.23-0jpp.31.el5_8
tomcat5-jsp-2.0-api
5.5.23-0jpp.31.el5_8
tomcat5-jsp-2.0-api-javadoc
5.5.23-0jpp.31.el5_8
tomcat5-server-lib
5.5.23-0jpp.31.el5_8
tomcat5-servlet-2.4-api
5.5.23-0jpp.31.el5_8
tomcat5-servlet-2.4-api-javadoc
5.5.23-0jpp.31.el5_8
tomcat5-webapps
5.5.23-0jpp.31.el5_8
Oracle Linux i386
tomcat5
5.5.23-0jpp.31.el5_8
tomcat5-admin-webapps
5.5.23-0jpp.31.el5_8
tomcat5-common-lib
5.5.23-0jpp.31.el5_8
tomcat5-jasper
5.5.23-0jpp.31.el5_8
tomcat5-jasper-javadoc
5.5.23-0jpp.31.el5_8
tomcat5-jsp-2.0-api
5.5.23-0jpp.31.el5_8
tomcat5-jsp-2.0-api-javadoc
5.5.23-0jpp.31.el5_8
tomcat5-server-lib
5.5.23-0jpp.31.el5_8
tomcat5-servlet-2.4-api
5.5.23-0jpp.31.el5_8
tomcat5-servlet-2.4-api-javadoc
5.5.23-0jpp.31.el5_8
tomcat5-webapps
5.5.23-0jpp.31.el5_8
Связанные CVE
Связанные уязвимости
Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 ...