{"schema_version": "1.3.1", "id": "RLSA-2024:5693", "modified": "2024-09-17T00:57:23.228756Z", "published": "2024-09-17T00:55:59.307259Z", "related": ["CVE-2024-34750"], "summary": "Important: tomcat security update", "details": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nSecurity Fix(es):\n\n* tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "affected": [{"package": {"ecosystem": "Rocky Linux:9", "name": "tomcat", "purl": "pkg:rpm/rocky-linux/tomcat?distro=rocky-linux-9-x86-64&epoch=1"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "1:9.0.87-1.el9_4.2"}], "database_specific": {"yum_repository": "AppStream"}}]}], "references": [{"type": "ADVISORY", "url": "https://errata.rockylinux.org/RLSA-2024:5693"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295651"}], "credits": [{"name": "Rocky Enterprise Software Foundation"}, {"name": "Red Hat"}]}