Fedora 28: tomcat Security Update
Summary
Tomcat is the servlet container that is used in the official Reference
Implementation for the Java Servlet and JavaServer Pages technologies.
The Java Servlet and JavaServer Pages specifications are developed by
Sun under the Java Community Process.
Tomcat is developed in an open and participatory environment and
released under the Apache Software License version 2.0. Tomcat is intended
to be a collaboration of the best-of-breed developers from around the world.
This update includes a rebase from 8.5.30 up to 8.5.35 which resolves one CVE
along with various other bugs/features: rhbz#1636513 - CVE-2018-11784 tomcat:
Open redirect in default servlet
* Thu Dec 13 2018 Coty Sutherland
- Update to 8.5.35
- Resolves: rhbz#1636513 - CVE-2018-11784 tomcat: Open redirect in default servlet
* Tue Jul 31 2018 Coty Sutherland
- Update to 8.5.32
- Resolves: rhbz#1607584 - CVE-2018-8037 tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up
- Resolves: rhbz#1607586 - CVE-2018-8034 tomcat: host name verification missing in WebSocket client
- Resolves: rhbz#1579612 - CVE-2018-8014 tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins
- Resolves: rhbz#1624929 - CVE-2018-1336 tomcat: A bug in the UTF-8 decoder can lead to DoS
* Tue May 1 2018 Coty Sutherland
- Update to 8.5.30
[ 1 ] Bug #1636514 - CVE-2018-11784 tomcat: Open redirect in default servlet [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1636514
[ 2 ] Bug #1636513 - CVE-2018-11784 tomcat: Open redirect in default servlet [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1636513
su -c 'dnf upgrade --advisory FEDORA-2018-b18f9dd65b' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/
FEDORA-2018-b18f9dd65b 2019-04-03 02:02:07.133309 Product : Fedora 28 Version : 8.5.35 Release : 1.fc28 URL : https://tomcat.apache.org/ Summary : Apache Servlet/JSP Engine, RI for Servlet 3.1/JSP 2.3 API Description : Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world. This update includes a rebase from 8.5.30 up to 8.5.35 which resolves one CVE along with various other bugs/features: rhbz#1636513 - CVE-2018-11784 tomcat: Open redirect in default servlet * Thu Dec 13 2018 Coty Sutherland - 1:8.5.35-1 - Update to 8.5.35 - Resolves: rhbz#1636513 - CVE-2018-11784 tomcat: Open redirect in default servlet * Tue Jul 31 2018 Coty Sutherland - 1:8.5.32-1 - Update to 8.5.32 - Resolves: rhbz#1607584 - CVE-2018-8037 tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up - Resolves: rhbz#1607586 - CVE-2018-8034 tomcat: host name verification missing in WebSocket client - Resolves: rhbz#1579612 - CVE-2018-8014 tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins - Resolves: rhbz#1624929 - CVE-2018-1336 tomcat: A bug in the UTF-8 decoder can lead to DoS * Tue May 1 2018 Coty Sutherland - 1:8.5.30-1 - Update to 8.5.30 [ 1 ] Bug #1636514 - CVE-2018-11784 tomcat: Open redirect in default servlet [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=1636514 [ 2 ] Bug #1636513 - CVE-2018-11784 tomcat: Open redirect in default servlet [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1636513 su -c 'dnf upgrade --advisory FEDORA-2018-b18f9dd65b' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/
Change Log
References