You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa tomcat

Sigurnosni nedostaci programskog paketa tomcat

——————————————————————————–
Fedora Update Notification
FEDORA-2018-b1832101b8
2018-08-30 04:50:15.759184
——————————————————————————–

Name : tomcat
Product : Fedora 28
Version : 8.5.32
Release : 1.fc28
URL : http://tomcat.apache.org/
Summary : Apache Servlet/JSP Engine, RI for Servlet 3.1/JSP 2.3 API
Description :
Tomcat is the servlet container that is used in the official Reference
Implementation for the Java Servlet and JavaServer Pages technologies.
The Java Servlet and JavaServer Pages specifications are developed by
Sun under the Java Community Process.

Tomcat is developed in an open and participatory environment and
released under the Apache Software License version 2.0. Tomcat is intended
to be a collaboration of the best-of-breed developers from around the world.

——————————————————————————–
Update Information:

This update includes a rebase from 8.5.30 up to 8.5.32 which resolves two CVEs
along with various other bugs/features: * rhbz#1579612 CVE-2018-8014 tomcat:
Insecure defaults in CORS filter enable ‘supportsCredentials’ for all origins *
rhbz#1607586 CVE-2018-8034 tomcat: host name verification missing in WebSocket
client * rhbz#1607584 CVE-2018-8037 tomcat: Due to a mishandling of close in
NIO/NIO2 connectors user sessions can get mixed up
——————————————————————————–
ChangeLog:

* Tue Jul 31 2018 Coty Sutherland <csutherl@redhat.com> – 1:8.5.32-1
– Update to 8.5.32
* Tue May 1 2018 Coty Sutherland <csutherl@redhat.com> – 1:8.5.30-1
– Update to 8.5.30
——————————————————————————–
References:

[ 1 ] Bug #1579612 – CVE-2018-8014 tomcat: Insecure defaults in CORS filter enable ‘supportsCredentials’ for all origins [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1579612
[ 2 ] Bug #1607586 – CVE-2018-8034 tomcat: host name verification missing in WebSocket client [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1607586
[ 3 ] Bug #1607584 – CVE-2018-8037 tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1607584
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2018-b1832101b8’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa ntp

Otkriveni su sigurnosni nedostaci u programskom paketu ntp za operacijski sustav Fedora. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja,...

Close