tomcat-9.0.87-3.el9_6.1
エラータID: AXSA:2025-10690:04
リリース日:
2025/08/04 Monday - 17:58
題名:
tomcat-9.0.87-3.el9_6.1
影響のあるチャネル:
MIRACLE LINUX 9 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- Apache Tomcat には、Time-of-check Time-of-use (TOCTOU) レース
コンディションの問題があるため、リモートの攻撃者により、情報の
漏洩、データ破壊、およびサービス拒否攻撃などを可能とする脆弱性が
存在します。(CVE-2024-56337)
- Apache Tomcat のリクエストのクリーンアップ処理には、HTTP/2
ヘッダー内の優先度のチェック処理に不備の起因したメモリリークの
問題があるため、リモートの攻撃者により、細工された HTTP/2 の
優先度ヘッダーの処理を介して、サービス拒否攻撃 (メモリ枯渇) を
可能とする脆弱性が存在します。(CVE-2025-31650)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2024-56337
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97. The mitigation for CVE-2024-50379 was incomplete. Users running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation parameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat: - running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true) - running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false) - running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed) Tomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97. The mitigation for CVE-2024-50379 was incomplete. Users running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation parameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat: - running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true) - running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false) - running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed) Tomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.
CVE-2025-31650
Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service. This issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5. Users are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue.
Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service. This issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5. Users are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue.
追加情報:
N/A
ダウンロード:
SRPMS
- tomcat-9.0.87-3.el9_6.1.src.rpm
MD5: aa378ca53cc980462fece9f5dc4a5ce4
SHA-256: 5e82b5a0831869569d376e3399066c6592ea75aea92204c9f9310345e1101841
Size: 15.13 MB
Asianux Server 9 for x86_64
- tomcat-9.0.87-3.el9_6.1.noarch.rpm
MD5: d4bae6cbb08b9e906e0f69f42306164a
SHA-256: 69e5ee3f1abeb096923e271f8c3703dc78229000a5acea113e7ec5ae2d240d4a
Size: 98.62 kB - tomcat-admin-webapps-9.0.87-3.el9_6.1.noarch.rpm
MD5: c310dfacaab07d94d4e3b933c66051be
SHA-256: 7b6d5f2b0d44a6225ed134178425e5ce71e7c3bc1e9d23fa46641b3f7369d420
Size: 79.39 kB - tomcat-docs-webapp-9.0.87-3.el9_6.1.noarch.rpm
MD5: c7673fd40d122e763fe1d4d34ba558cf
SHA-256: 4cb53ae3cc26820d42a8bf19f774c497ba2d9aa49fcb7cdd30303fed28b08e3a
Size: 725.49 kB - tomcat-el-3.0-api-9.0.87-3.el9_6.1.noarch.rpm
MD5: e578a06de2100d485a48bc1ac94c5f53
SHA-256: 2a29c38e75d60ef8ba381f2bcb9a11bb329b1836a81617958738aaaee01c34e2
Size: 105.16 kB - tomcat-jsp-2.3-api-9.0.87-3.el9_6.1.noarch.rpm
MD5: eb9382b9485a8476a89c0dacc8ef4e6b
SHA-256: f68db0458ada0da9792279a259177f50d9f0cc5ca4881637df4782cf1d63843e
Size: 72.11 kB - tomcat-lib-9.0.87-3.el9_6.1.noarch.rpm
MD5: dc0578ce46b6818118bf3880506f1875
SHA-256: a4ede56243dcf465ba1c85066a3b7d33030c737464c1ea6ad44f8a438b3c7bf5
Size: 5.98 MB - tomcat-servlet-4.0-api-9.0.87-3.el9_6.1.noarch.rpm
MD5: c7057d437489344dcebd0c78cfaad3ed
SHA-256: fbe74682b99ce2fd8bbe8eb505054d6ea017566f26e717e3092c16b9a3374d18
Size: 284.09 kB - tomcat-webapps-9.0.87-3.el9_6.1.noarch.rpm
MD5: 3e174773d0eec498c340af123fc1237e
SHA-256: 1b3c912d1770c52700a6df0bf803986d9f1a8a91492de001b98a3ce4bbe969da
Size: 80.29 kB