[ All 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Project tomcat-1:9.0.87-1.el8_10.7

Name tomcat
Epoch 1
Version 9.0.87
Release 1.el8_10.7
Website/URL http://tomcat.apache.org/
License ASL 2.0
Build Time 2025-12-11 09:05:54
Build Host builder-x86-03.inferitos.ru
Summary Apache Servlet/JSP Engine, RI for Servlet 4.0/JSP 2.3 API
Repositories AppStream
Description Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world.
Errata
× Full screenshot
Found 6 old versions
Packages link
Package Summary SHA-256 checksum
noarch
tomcat-1:9.0.87-1.el8_10.7.noarch Apache Servlet/JSP Engine, RI for Servlet 4.0/JSP 2.3 API ac88963ca09c2caeaafda474162d676733b161ad44a0f9d443bd63873b2f3a80 download
tomcat-admin-webapps-1:9.0.87-1.el8_10.7.noarch The host-manager and manager web applications for Apache Tomcat c54f73792965e7a59bc41a2bf909e7420eda8ef14f3e7f42a03817fdd9ad95a1 download
tomcat-docs-webapp-1:9.0.87-1.el8_10.7.noarch The docs web application for Apache Tomcat 83b9560302bc6547b1ebf0faa1690f6abbe74847c233dca301f2ba2673bee3b8 download
tomcat-el-3.0-api-1:9.0.87-1.el8_10.7.noarch Apache Tomcat Expression Language v3.0 API Implementation Classes 815d10592e8639699325e85b1b58c292cd273f3de9ffc058c9e8a400a35b4ceb download
tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.7.noarch Apache Tomcat JavaServer Pages v2.3 API Implementation Classes c52928c11c02822b75f0f1f7870cb6810a5922ae7da09c3503d8b7c597a41856 download
tomcat-lib-1:9.0.87-1.el8_10.7.noarch Libraries needed to run the Tomcat Web container b56be2d75ee627887138501c8f22039f5e997e9d542cf908b1b1cdb911b48705 download
tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.7.noarch Apache Tomcat Java Servlet v4.0 API Implementation Classes 1429aebc6d2fb0e13b9853d4c05dd9cfd86c20db27911c76fbab1d89626202c4 download
tomcat-webapps-1:9.0.87-1.el8_10.7.noarch The ROOT web application for Apache Tomcat dd7cb73d38b99ad68942bbe9e821ac8b8c04e61d33a8876956d6053a7b8c8553 download
src
tomcat-1:9.0.87-1.el8_10.7.src Apache Servlet/JSP Engine, RI for Servlet 4.0/JSP 2.3 API f1644dfbd6cf1542718d0af6a9521582ccb5048725dd88e4698d498881f149bc download
Changelog link
* Thu Nov 27 2025 Adam Krajcik <akrajcik@redhat.com> - 1:9.0.87-1.el8_10.7
- Resolves: RHEL-124507
  tomcat: Directory traversal via rewrite with possible RCE (CVE-2025-55752)
- Resolves: RHEL-91743
  tomcat: Bypass of rules in Rewrite Valve (CVE-2025-31651)

* Thu Aug 14 2025 Adam Krajcik <akrajcik@redhat.com> - 1:9.0.87-1.el8_10.6
- Resolves: RHEL-102193
  tomcat: http/2 "MadeYouReset" DoS attack through HTTP/2 control frames (CVE-2025-48989)

* Tue Aug 12 2025 Adam Krajcik <akrajcik@redhat.com> - 1:9.0.87-1.el8_10.5
- Resolves: RHEL-108486
  tomcat: Apache Commons FileUpload DOS via part headers (CVE-2025-48976)
- Resolves: RHEL-108494
  tomcat: Dos in multipart upload (CVE-2025-48988)
- Resolves: RHEL-108502
  tomcat: Security constraint bypass for pre/post-resources (CVE-2025-49125)
- Resolves: RHEL-108510
  tomcat: Denial of service (CVE-2025-52434)
- Resolves: RHEL-108524
  tomcat: Denial of service (CVE-2025-52520)
- Resolves: RHEL-108518
  tomcat: Denial of service (CVE-2025-53506)

* Mon May 26 2025 Adam Krajcik <akrajcik@redhat.com> - 1:9.0.87-1.el8_10.4
- Resolves: RHEL-91761
  tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650)
- Resolves: RHEL-71971
  tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337)

* Wed Apr 02 2025 Adam Krajcik <akrajcik@redhat.com> - 1:9.0.87-1.el8_10.3
- Resolves: RHEL-82934
  tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT (CVE-2025-24813)
- Resolves: RHEL-71708
  tomcat: RCE due to TOCTOU issue in JSP compilation (CVE-2024-50379)

* Thu Aug 08 2024 Adam Krajcik <akrajcik@redhat.com> - 1:9.0.87-1.el8_10.2
- Resolves: RHEL-46167
  tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750)

* Mon Jun 03 2024 Sokratis Zappis <szappis@redhat.com> - 1:9.0.87-1.el8_10.1
- Resolves: RHEL-38548 - Amend tomcat package's changelog so that fixed CVEs are mentioned explicitly
- Resolves: RHEL-35813 - Rebase tomcat to version 9.0.87
- Resolves: RHEL-29255
  tomcat: Apache Tomcat: WebSocket DoS with incomplete closing handshake (CVE-2024-23672)
- Resolves: RHEL-29250
  tomcat: Apache Tomcat: HTTP/2 header handling DoS (CVE-2024-24549)

* Fri Jan 19 2024 Hui Wang <huwang@redhat.com> - 1:9.0.62-30
- Resolves: RHEL-6971

* Thu Jan 18 2024 Hui Wang <huwang@redhat.com> - 1:9.0.62-29
- Resolves: RHEL-17602
  tomcat: HTTP request smuggling via malformed trailer headers (CVE-2023-46589)
- tomcat: Apache Tomcat: HTTP/2 header handling DoS (CVE-2024-24549)

* Thu Nov 23 2023 Hui Wang <huwang@redhat.com> - 1:9.0.62-28
- Resolves: RHEL-13907
  tomcat: incorrectly parsed http trailer headers can cause request smuggling (CVE-2023-45648)
- Resolves: RHEL-13904
  tomcat: improper cleaning of recycled objects could lead to information leak (CVE-2023-42795)
- Resolves: RHEL-12951
  tomcat: FileUpload: DoS due to accumulation of temporary files on Windows (CVE-2023-42794)
- Resolves: RHEL-12544
  tomcat: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)
- Resolves: RHEL-2386
  tomcat: Open Redirect vulnerability in FORM authentication (CVE-2023-41080)