An update for tomcat is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP2 and openEuler-20.03-LTS-SP3 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2022-1537 Final 1.0 1.0 2022-02-26 Initial 2022-02-26 2022-02-26 openEuler SA Tool V1.0 2022-02-26 tomcat security update An update for tomcat is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP2 and openEuler-20.03-LTS-SP3. The Apache Tomcat software is developed in an open and participatory environment and released under the Apache License version 2. The Apache Tomcat project is intended to be a collaboration of the best-of-breed developers from around the world. We invite you to participate in this open development project Security Fix(es): The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.(CVE-2022-23181) An update for tomcat is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP2 and openEuler-20.03-LTS-SP3. openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. High tomcat https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1537 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-23181 https://nvd.nist.gov/vuln/detail/CVE-2022-23181 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP2 openEuler-20.03-LTS-SP3 tomcat-9.0.10-25.oe1.noarch.rpm tomcat-jsvc-9.0.10-25.oe1.noarch.rpm tomcat-help-9.0.10-25.oe1.noarch.rpm tomcat-9.0.10-25.oe1.noarch.rpm tomcat-jsvc-9.0.10-25.oe1.noarch.rpm tomcat-help-9.0.10-25.oe1.noarch.rpm tomcat-9.0.10-24.oe1.noarch.rpm tomcat-jsvc-9.0.10-24.oe1.noarch.rpm tomcat-help-9.0.10-24.oe1.noarch.rpm tomcat-9.0.10-25.oe1.src.rpm tomcat-9.0.10-25.oe1.src.rpm tomcat-9.0.10-24.oe1.src.rpm The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore. 2022-02-26 CVE-2022-23181 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP2 openEuler-20.03-LTS-SP3 High 7.0 AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H tomcat security update 2022-02-26 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1537