Описание
ELSA-2017-3081: tomcat security update (IMPORTANT)
[0:7.0.76-3]
- Resolves: rhbz#1498344 CVE-2017-12615 CVE-2017-12617 tomcat: various flaws
- Resolves: rhbz#1495654 CVE-2017-7674 tomcat: Vary header not added by CORS filter leading to cache poisoning
- Resolves: rhbz#1470596 CVE-2017-5647 Add follow up revision
Обновленные пакеты
Oracle Linux 7
Oracle Linux aarch64
tomcat
7.0.76-3.el7_4
tomcat-admin-webapps
7.0.76-3.el7_4
tomcat-docs-webapp
7.0.76-3.el7_4
tomcat-el-2.2-api
7.0.76-3.el7_4
tomcat-javadoc
7.0.76-3.el7_4
tomcat-jsp-2.2-api
7.0.76-3.el7_4
tomcat-jsvc
7.0.76-3.el7_4
tomcat-lib
7.0.76-3.el7_4
tomcat-servlet-3.0-api
7.0.76-3.el7_4
tomcat-webapps
7.0.76-3.el7_4
Oracle Linux x86_64
tomcat
7.0.76-3.el7_4
tomcat-admin-webapps
7.0.76-3.el7_4
tomcat-docs-webapp
7.0.76-3.el7_4
tomcat-el-2.2-api
7.0.76-3.el7_4
tomcat-javadoc
7.0.76-3.el7_4
tomcat-jsp-2.2-api
7.0.76-3.el7_4
tomcat-jsvc
7.0.76-3.el7_4
tomcat-lib
7.0.76-3.el7_4
tomcat-servlet-3.0-api
7.0.76-3.el7_4
tomcat-webapps
7.0.76-3.el7_4
Связанные уязвимости
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.