ELSA-2025-7494

ELSA-2025-7494 - tomcat9 security update

Type:SECURITY
Impact:MODERATE
Release Date:2025-06-27

Description


[1:9.0.87-5]
- Resolves: RHEL-82927
tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT (CVE-2025-24813)


Related CVEs


CVE-2025-24813

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 10 (aarch64) tomcat9-9.0.87-5.el10_0.src.rpm94680c29c8e54898dfb303d01a46fddfe69c49475fc007c0d2ebc26145ec8735-ol10_aarch64_appstream
tomcat9-9.0.87-5.el10_0.noarch.rpme21368f734add52d2d9947669151b3c031a892277e7dbaaabe4dd3408c3d3c89-ol10_aarch64_appstream
tomcat9-admin-webapps-9.0.87-5.el10_0.noarch.rpm680b9a34341afb5c34d96cfa280af2e70621855ee5e9b305108d1beda6106972-ol10_aarch64_appstream
tomcat9-docs-webapp-9.0.87-5.el10_0.noarch.rpmc3dbf32c4cb3ff4a3d11b92f0e63b33d0fae9a28f053e03c301414c4adfae82b-ol10_aarch64_appstream
tomcat9-el-3.0-api-9.0.87-5.el10_0.noarch.rpm610e9bf48730aad645dc8b9d6f560cb5a6bdeafb4f59698e5e5c280330d876d2-ol10_aarch64_appstream
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.noarch.rpm685abba8e8e3d2b4f688a378e7ce9043ef2d79f6235732603aeeb273df927ac7-ol10_aarch64_appstream
tomcat9-lib-9.0.87-5.el10_0.noarch.rpm98d84e3f72179f33343eada7958c88bc8cd70928d2b828941d9e3345747b2a15-ol10_aarch64_appstream
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.noarch.rpmaef8470042a33fa6a68e71a74962a48aabc1d27375f59b5e65a824bad8d35568-ol10_aarch64_appstream
tomcat9-webapps-9.0.87-5.el10_0.noarch.rpm8c6ef499675b6f0b8504d268890a10d8362cf58db4f47e23ab6e4f9f91ab3d80-ol10_aarch64_appstream
Oracle Linux 10 (x86_64) tomcat9-9.0.87-5.el10_0.src.rpm94680c29c8e54898dfb303d01a46fddfe69c49475fc007c0d2ebc26145ec8735-ol10_x86_64_appstream
tomcat9-9.0.87-5.el10_0.noarch.rpme21368f734add52d2d9947669151b3c031a892277e7dbaaabe4dd3408c3d3c89-ol10_x86_64_appstream
tomcat9-admin-webapps-9.0.87-5.el10_0.noarch.rpm680b9a34341afb5c34d96cfa280af2e70621855ee5e9b305108d1beda6106972-ol10_x86_64_appstream
tomcat9-docs-webapp-9.0.87-5.el10_0.noarch.rpmc3dbf32c4cb3ff4a3d11b92f0e63b33d0fae9a28f053e03c301414c4adfae82b-ol10_x86_64_appstream
tomcat9-el-3.0-api-9.0.87-5.el10_0.noarch.rpm610e9bf48730aad645dc8b9d6f560cb5a6bdeafb4f59698e5e5c280330d876d2-ol10_x86_64_appstream
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.noarch.rpm685abba8e8e3d2b4f688a378e7ce9043ef2d79f6235732603aeeb273df927ac7-ol10_x86_64_appstream
tomcat9-lib-9.0.87-5.el10_0.noarch.rpm98d84e3f72179f33343eada7958c88bc8cd70928d2b828941d9e3345747b2a15-ol10_x86_64_appstream
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.noarch.rpmaef8470042a33fa6a68e71a74962a48aabc1d27375f59b5e65a824bad8d35568-ol10_x86_64_appstream
tomcat9-webapps-9.0.87-5.el10_0.noarch.rpm8c6ef499675b6f0b8504d268890a10d8362cf58db4f47e23ab6e4f9f91ab3d80-ol10_x86_64_appstream



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete