ELSA-2008-0042

ELSA-2008-0042 - Moderate: tomcat security update

Type:SECURITY
Impact:MODERATE
Release Date:2008-03-11

Description


[5.5.23-0jpp.3.0.3]
- Patch for CVE-2007-5342
Resolves: bz# 427776
- Patch for CVE-2007-5461
Resolves: bz# 334561


Related CVEs


CVE-2007-5461
CVE-2007-5342

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (i386) tomcat5-5.5.23-0jpp.3.0.3.el5_1.src.rpme24547281677bf4676557d21903f0bf9e5f179c7c851961c50d16bf518c0c8b8ELSA-2013-0870el5_u1_i386_patch
tomcat5-5.5.23-0jpp.3.0.3.el5_1.i386.rpm17c24e7c404204eca6ad12c8a12e0aae0ee26daf37ab549f22cd9ab6a7a1f366ELSA-2013-0870el5_u1_i386_patch
tomcat5-admin-webapps-5.5.23-0jpp.3.0.3.el5_1.i386.rpm6f4cdfe9df7b4d66afc673dcfceb4861fee56db44435e0a41c95a6c180d0301fELSA-2013-0870el5_u1_i386_patch
tomcat5-common-lib-5.5.23-0jpp.3.0.3.el5_1.i386.rpm69a8f990fa6675035df343d9078c0a416b0ce35105451433b030f24ac8aa5d13ELSA-2013-0870el5_u1_i386_patch
tomcat5-jasper-5.5.23-0jpp.3.0.3.el5_1.i386.rpm80dc0703562cb1f770e73d1ad8be4afbe73b30bce1f2a955122e5c70fa26f4f5ELSA-2013-0870el5_u1_i386_patch
tomcat5-jasper-javadoc-5.5.23-0jpp.3.0.3.el5_1.i386.rpm1323571144647b65ffd728cf89ca4d0dae2ab5be4f90c7af4589a3e95357335aELSA-2013-0870el5_u1_i386_patch
tomcat5-jsp-2.0-api-5.5.23-0jpp.3.0.3.el5_1.i386.rpmf7d72dd51a7d022bbe9cc86e98651f68a86c2199f51c3e8d928d2f5bd029af37ELSA-2013-0870el5_u1_i386_patch
tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.3.0.3.el5_1.i386.rpm595b87e26af6a801524bdb6569f526765ebc35c7530a74517cbe4ecaf4e016cbELSA-2013-0870el5_u1_i386_patch
tomcat5-server-lib-5.5.23-0jpp.3.0.3.el5_1.i386.rpm8883f184ad9cc41fec4a412ea005810b859d8c09a53645fc5030b2bb9086da41ELSA-2013-0870el5_u1_i386_patch
tomcat5-servlet-2.4-api-5.5.23-0jpp.3.0.3.el5_1.i386.rpmdbb14161ca8fbcb5ce60bd7651146857d92d47c2f14e2aaa0ffd92be365f0528ELSA-2013-0870el5_u1_i386_patch
tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.3.0.3.el5_1.i386.rpm876eccfd6009fc6cf68a8580f1c36f522e5f365f4d4ffb3e353ae77b580de6f8ELSA-2013-0870el5_u1_i386_patch
tomcat5-webapps-5.5.23-0jpp.3.0.3.el5_1.i386.rpma42dd6340f717487197b7aee2f6e08bc959698a79d788becac725b4428d2e9b0ELSA-2013-0870el5_u1_i386_patch
Oracle Linux 5 (x86_64) tomcat5-5.5.23-0jpp.3.0.3.el5_1.src.rpme24547281677bf4676557d21903f0bf9e5f179c7c851961c50d16bf518c0c8b8ELSA-2013-0870el5_u1_x86_64_patch
tomcat5-5.5.23-0jpp.3.0.3.el5_1.x86_64.rpmc7199738e446c2d2bab17bcf3bbe943554e8f574b21bb227a57aa26373449a2fELSA-2013-0870el5_u1_x86_64_patch
tomcat5-admin-webapps-5.5.23-0jpp.3.0.3.el5_1.x86_64.rpmefc64606b701a0d11dc925a8f310f002ce94d97f436374ef98d2be3be2da1b18ELSA-2013-0870el5_u1_x86_64_patch
tomcat5-common-lib-5.5.23-0jpp.3.0.3.el5_1.x86_64.rpmd05ee4b7f52d62b1b64d0ee13aaf543497c4bc5148532efa69ca216555c11183ELSA-2013-0870el5_u1_x86_64_patch
tomcat5-jasper-5.5.23-0jpp.3.0.3.el5_1.x86_64.rpm6a6e13e6712887a34beedd9f8b77f36147df430bda832b8d3afb8c58ad7b72caELSA-2013-0870el5_u1_x86_64_patch
tomcat5-jasper-javadoc-5.5.23-0jpp.3.0.3.el5_1.x86_64.rpmdf658d2ac112e1531a6733e00682438ba315625bbeb4f5c0ca8b4e8286b0a56cELSA-2013-0870el5_u1_x86_64_patch
tomcat5-jsp-2.0-api-5.5.23-0jpp.3.0.3.el5_1.x86_64.rpmaa19256b06342ac346e656fa344a9938f2347ef898012f27e2c180708e074a9cELSA-2013-0870el5_u1_x86_64_patch
tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.3.0.3.el5_1.x86_64.rpmf465c24a1b59a12a36322b4560460fcb731786a63c2e29154cb717fd37f47bd6ELSA-2013-0870el5_u1_x86_64_patch
tomcat5-server-lib-5.5.23-0jpp.3.0.3.el5_1.x86_64.rpmc3fec50879f25dd9afcb3440a64e13ed1767702354a598f23f2660c0eb27ca80ELSA-2013-0870el5_u1_x86_64_patch
tomcat5-servlet-2.4-api-5.5.23-0jpp.3.0.3.el5_1.x86_64.rpm788c4f0afc77e3d0c25ef518dcb58a53e1dbe6b642a30d991a7453e986dc505dELSA-2013-0870el5_u1_x86_64_patch
tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.3.0.3.el5_1.x86_64.rpm18357b4c0a96b7af6b47951bb21011a67657bf6d99b88ab0d493eab76cf9c811ELSA-2013-0870el5_u1_x86_64_patch
tomcat5-webapps-5.5.23-0jpp.3.0.3.el5_1.x86_64.rpmc5f205eb4d509bdc0e0f41b7dcf50d34ac09662c3da58db932c2c9339e57f25eELSA-2013-0870el5_u1_x86_64_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete