tomcat-9.0.62-37.el9

エラータID: AXSA:2023-6944:05

Release date: 
Tuesday, December 12, 2023 - 11:25
Subject: 
tomcat-9.0.62-37.el9
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
Moderate
Description: 

Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.

Security Fix(es):

* Apache Commons FileUpload: FileUpload DoS with excessive parts (CVE-2023-24998)
* tomcat: not including the secure attribute causes information disclosure (CVE-2023-28708)
* tomcat: Fix for CVE-2023-24998 was incomplete (CVE-2023-28709)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2023-24998
Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured.
CVE-2023-28708
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.
CVE-2023-28709
The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. tomcat-9.0.62-37.el9.src.rpm
    MD5: 4f96ab951adc0ee8a5f205cf1350531d
    SHA-256: eca0115d97292980905d396d7950feee16cc3140a72667fa2cc1de2397afac38
    Size: 14.35 MB

Asianux Server 9 for x86_64
  1. tomcat-9.0.62-37.el9.noarch.rpm
    MD5: 10f5e7bd3b3f545a22dc9082fc1d2caf
    SHA-256: b9d9d62177a2b61c3cf4c4e2ff2360e04c3f82aaf5af6b7f59d84905d8e18788
    Size: 89.22 kB
  2. tomcat-admin-webapps-9.0.62-37.el9.noarch.rpm
    MD5: 47c3338c8ff5536bfe9dd18027f9bb94
    SHA-256: 7dec0f597c2babcd7c3adff6e71b0254c7da6e2a0a9d85666c7ab73d52096c5e
    Size: 71.26 kB
  3. tomcat-docs-webapp-9.0.62-37.el9.noarch.rpm
    MD5: 18d1bbfca8faac3793cff980df086f6f
    SHA-256: dcca14c8b041db04a3bee7358157b187a8b4ca9217f2d6cd9610d1cf7eb8ce48
    Size: 670.97 kB
  4. tomcat-el-3.0-api-9.0.62-37.el9.noarch.rpm
    MD5: c9392474f655b3115dcd5db54da8cdaa
    SHA-256: 36b1d9a62c33d8091f4dd1f380d2e2586c4d72d5a6842d91faf2cee2a2b0b582
    Size: 104.13 kB
  5. tomcat-jsp-2.3-api-9.0.62-37.el9.noarch.rpm
    MD5: 6f7c0adad1ce062982775d95f3c7993e
    SHA-256: 67f3587993109e93460eea907fbacf3e9465c7ed703aeafa11f91d4cfc4f9a86
    Size: 64.03 kB
  6. tomcat-lib-9.0.62-37.el9.noarch.rpm
    MD5: a266f684614088075b3ff2d9a74b77e0
    SHA-256: 58c91212fd80be426f6bff99480ee27394ce714702041ecb42b50ec0926d30ab
    Size: 5.81 MB
  7. tomcat-servlet-4.0-api-9.0.62-37.el9.noarch.rpm
    MD5: 9be46fcf3cf3c1ea6782aff171acc7a0
    SHA-256: e8a9b976526ffca3dd090d0a4d38851b598413a8dd65f23bf3cdb278120db443
    Size: 282.55 kB
  8. tomcat-webapps-9.0.62-37.el9.noarch.rpm
    MD5: 59df7ce3d182c26c8d290f7983664847
    SHA-256: 54603ed7be7b16c779e7119188fee286ad906dd4acef67433c66549e07daf6b9
    Size: 79.08 kB