Amazon Linux 1 Security Advisory: ALAS-2021-1534
Advisory Release Date: 2021-09-02 22:54 Pacific
Advisory Updated Date: 2021-09-08 19:29 Pacific
A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65. (CVE-2021-30640)
Affected Packages:
tomcat7
Issue Correction:
Run yum update tomcat7 to update your system.
noarch:
tomcat7-7.0.109-1.41.amzn1.noarch
tomcat7-lib-7.0.109-1.41.amzn1.noarch
tomcat7-admin-webapps-7.0.109-1.41.amzn1.noarch
tomcat7-jsp-2.2-api-7.0.109-1.41.amzn1.noarch
tomcat7-docs-webapp-7.0.109-1.41.amzn1.noarch
tomcat7-el-2.2-api-7.0.109-1.41.amzn1.noarch
tomcat7-webapps-7.0.109-1.41.amzn1.noarch
tomcat7-log4j-7.0.109-1.41.amzn1.noarch
tomcat7-servlet-3.0-api-7.0.109-1.41.amzn1.noarch
tomcat7-javadoc-7.0.109-1.41.amzn1.noarch
src:
tomcat7-7.0.109-1.41.amzn1.src