tomcat-9.0.87-1.el8_10.4
エラータID: AXSA:2025-10519:03
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
* tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337)
* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2024-50379
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration). This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97. Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.
CVE-2024-56337
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97. The mitigation for CVE-2024-50379 was incomplete. Users running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation parameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat: - running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true) - running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false) - running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed) Tomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.
CVE-2025-31650
Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service. This issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5. Users are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue.
Update packages.
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration). This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97. Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97. The mitigation for CVE-2024-50379 was incomplete. Users running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation parameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat: - running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true) - running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false) - running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed) Tomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.
Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service. This issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5. Users are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue.
N/A
SRPMS
- tomcat-9.0.87-1.el8_10.4.src.rpm
MD5: 0216a052196155756317b27867ebc463
SHA-256: a6d0e15b62d180424a779cd0327a1de7367eca0a26df8f3654c5adde6d3884df
Size: 15.12 MB
Asianux Server 8 for x86_64
- tomcat-9.0.87-1.el8_10.4.noarch.rpm
MD5: 7ab44b633eb46da5388b1fe39342ad19
SHA-256: 04276961eb8fcd654df0b6106bbd1f92eaa74c804f840ce6751ebee693e4ed8b
Size: 93.68 kB - tomcat-admin-webapps-9.0.87-1.el8_10.4.noarch.rpm
MD5: 4eb454f95a88223dc3e1911203ab04e9
SHA-256: d610cf498ef283894a4664d44d2778b5819f4d179ed07e81816575b5526ef95e
Size: 74.61 kB - tomcat-docs-webapp-9.0.87-1.el8_10.4.noarch.rpm
MD5: f0e54475db5f24a5eca8fb96f5827e11
SHA-256: b89f8d1bebcb6b2a399a6503cfa6c4df4c75208ba544bee3d956887f70b08e18
Size: 755.88 kB - tomcat-el-3.0-api-9.0.87-1.el8_10.4.noarch.rpm
MD5: 959bdf1af577ce2c211edba6421b0973
SHA-256: 2f0a230dbf8f6e142c2e355211479092987f22d12941b77ad0506b76d0d10f2d
Size: 107.64 kB - tomcat-jsp-2.3-api-9.0.87-1.el8_10.4.noarch.rpm
MD5: 7e694ef85b7647440ddf3c30b37c8d5d
SHA-256: 5b0d88f7e316f8da26f0fa8556cb1aad17ef7a4cc216cc2b67f15963995cfda1
Size: 73.53 kB - tomcat-lib-9.0.87-1.el8_10.4.noarch.rpm
MD5: c40f5bd3ccb331308db560770ee36d30
SHA-256: f3189f3bfddefc8fb077d6dc871ec6368fabf2b58b0b289f59446a1466b51c0a
Size: 6.05 MB - tomcat-servlet-4.0-api-9.0.87-1.el8_10.4.noarch.rpm
MD5: 75dbea88a3fdff93700ade173018766f
SHA-256: 54c39f1737b35a3b1e8accb7db50e0423609ec2ed492cf21aa60b3961f74bb7f
Size: 288.21 kB - tomcat-webapps-9.0.87-1.el8_10.4.noarch.rpm
MD5: b3a37312621d50173b72dd830b5803bb
SHA-256: 53e37c71588c744df5b7aea64cdc0af4831d47d10202c271d5877d53947626b3
Size: 82.03 kB