An update for tomcat is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP2 and openEuler-20.03-LTS-SP3
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2022-1537
Final
1.0
1.0
2022-02-26
Initial
2022-02-26
2022-02-26
openEuler SA Tool V1.0
2022-02-26
tomcat security update
An update for tomcat is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP2 and openEuler-20.03-LTS-SP3.
The Apache Tomcat software is developed in an open and participatory environment and released under the Apache License version 2. The Apache Tomcat project is intended to be a collaboration of the best-of-breed developers from around the world. We invite you to participate in this open development project
Security Fix(es):
The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.(CVE-2022-23181)
An update for tomcat is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP2 and openEuler-20.03-LTS-SP3.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
tomcat
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1537
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-23181
https://nvd.nist.gov/vuln/detail/CVE-2022-23181
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
openEuler-20.03-LTS-SP3
tomcat-9.0.10-25.oe1.noarch.rpm
tomcat-jsvc-9.0.10-25.oe1.noarch.rpm
tomcat-help-9.0.10-25.oe1.noarch.rpm
tomcat-9.0.10-25.oe1.noarch.rpm
tomcat-jsvc-9.0.10-25.oe1.noarch.rpm
tomcat-help-9.0.10-25.oe1.noarch.rpm
tomcat-9.0.10-24.oe1.noarch.rpm
tomcat-jsvc-9.0.10-24.oe1.noarch.rpm
tomcat-help-9.0.10-24.oe1.noarch.rpm
tomcat-9.0.10-25.oe1.src.rpm
tomcat-9.0.10-25.oe1.src.rpm
tomcat-9.0.10-24.oe1.src.rpm
The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.
2022-02-26
CVE-2022-23181
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
openEuler-20.03-LTS-SP3
High
7.0
AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
tomcat security update
2022-02-26
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1537