tomcat-9.0.62-27.el8
エラータID: AXSA:2024-7363:01
Release date:
Thursday, January 11, 2024 - 08:15
Subject:
tomcat-9.0.62-27.el8
Affected Channels:
Asianux Server 8 for x86_64
Severity:
Moderate
Description:
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages
(JSP) technologies.
Security Fix(es):
Apache Commons FileUpload: FileUpload DoS with excessive parts
(CVE-2023-24998)
tomcat: not including the secure attribute causes information disclosure
(CVE-2023-28708)
tomcat: Fix for CVE-2023-24998 was incomplete (CVE-2023-28709)
CVE(s):
CVE-2023-24998
CVE-2023-28708
CVE-2023-28709
Solution:
Update packages.
CVEs:
CVE-2023-24998
Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured.
Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured.
CVE-2023-28708
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.
CVE-2023-28709
The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.
The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.
Additional Info:
N/A
Download:
SRPMS
- tomcat-9.0.62-27.el8.src.rpm
MD5: a1a3ab803ef15bdb854ccf307a548625
SHA-256: 0f6316f5a15aa40cb394712a2ff3bf177eb75de2d1d22b3b5df3d72a0d976ff1
Size: 14.34 MB
Asianux Server 8 for x86_64
- tomcat-9.0.62-27.el8.noarch.rpm
MD5: 38f15e5885d3f1f64dc0bf10705f9346
SHA-256: d0808f351c2ea40c2d7d331a92677633e9d17ee4927f3b1a8d518c29b9d2ab4b
Size: 90.31 kB - tomcat-admin-webapps-9.0.62-27.el8.noarch.rpm
MD5: cc73328b33934f63bc711dcdfeeca184
SHA-256: 2cb44666af04e54a93c96c783393d4f0faef69e418323759f905f46f6252d93c
Size: 72.01 kB - tomcat-docs-webapp-9.0.62-27.el8.noarch.rpm
MD5: a130e8bce02452adc2c7564408d2bdab
SHA-256: 678a523107c63f361a782eb292400c67349aa3eb0f841fa85b69042ef06cf20f
Size: 728.18 kB - tomcat-el-3.0-api-9.0.62-27.el8.noarch.rpm
MD5: 930f35814bc0a656c27bab8fe34639e0
SHA-256: 0194c1c0d22595df66165e35681eab052edb71d1fc8b1e2dd3c030ece9400527
Size: 105.19 kB - tomcat-jsp-2.3-api-9.0.62-27.el8.noarch.rpm
MD5: ae3346f36af025c0128ca383fb369c10
SHA-256: 1d4bb845d3efe9a3b69a161202b71278a448c50a28697d5ceceb2233121d012f
Size: 64.05 kB - tomcat-lib-9.0.62-27.el8.noarch.rpm
MD5: 0a659484a6d57b7d4f12053aedcbb326
SHA-256: e911d3b12e2ef40918438127dd49d8c00b5f6a22d1e153eca797cb8215cd2607
Size: 5.90 MB - tomcat-servlet-4.0-api-9.0.62-27.el8.noarch.rpm
MD5: 6f920a6fcb2ea355142871197e5fecbd
SHA-256: 7ea588863d816b84f568e26fbd73bef42bc26606c703204f12fd80c0477389e3
Size: 285.11 kB - tomcat-webapps-9.0.62-27.el8.noarch.rpm
MD5: a461c20b0d1bd2a837e255ac5fff99e2
SHA-256: 23dbbe9ccbb19b1f28a5c4123db6a0471384f2b842dbdfba7d674d9234ba9f99
Size: 79.43 kB