Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2021:0040-1

Опубликовано: 07 янв. 2021
Источник: suse-cvrf

Описание

Security update for tomcat

This update for tomcat fixes the following issues:

Security issues fixed:

  • CVE-2020-13943: Fixed a HTTP/2 Request mix-up (bsc#1177582).
  • CVE-2020-17527: Fixed a HTTP/2 request header mix-up (bsc#1179602).

Non-security issue fixed:

  • Removed tomcat-9.0.init and /usr/lib/tmpfiles.d/tomcat.conf from package. They're not used anymore becuse of systemd (bsc#1178396).
  • Fixed 'tomcat-servlet-4_0-api' package alternatives to use and keep a symlink for compatibility (bsc#1092163).
  • Don't give write permissions for the tomcat group on files and directories where it's not needed (bsc#1172562).

Список пакетов

SUSE Linux Enterprise High Performance Computing 15-ESPOS
tomcat-9.0.36-3.74.1
tomcat-admin-webapps-9.0.36-3.74.1
tomcat-el-3_0-api-9.0.36-3.74.1
tomcat-jsp-2_3-api-9.0.36-3.74.1
tomcat-lib-9.0.36-3.74.1
tomcat-servlet-4_0-api-9.0.36-3.74.1
tomcat-webapps-9.0.36-3.74.1
SUSE Linux Enterprise High Performance Computing 15-LTSS
tomcat-9.0.36-3.74.1
tomcat-admin-webapps-9.0.36-3.74.1
tomcat-el-3_0-api-9.0.36-3.74.1
tomcat-jsp-2_3-api-9.0.36-3.74.1
tomcat-lib-9.0.36-3.74.1
tomcat-servlet-4_0-api-9.0.36-3.74.1
tomcat-webapps-9.0.36-3.74.1
SUSE Linux Enterprise Server 15-LTSS
tomcat-9.0.36-3.74.1
tomcat-admin-webapps-9.0.36-3.74.1
tomcat-el-3_0-api-9.0.36-3.74.1
tomcat-jsp-2_3-api-9.0.36-3.74.1
tomcat-lib-9.0.36-3.74.1
tomcat-servlet-4_0-api-9.0.36-3.74.1
tomcat-webapps-9.0.36-3.74.1
SUSE Linux Enterprise Server for SAP Applications 15
tomcat-9.0.36-3.74.1
tomcat-admin-webapps-9.0.36-3.74.1
tomcat-el-3_0-api-9.0.36-3.74.1
tomcat-jsp-2_3-api-9.0.36-3.74.1
tomcat-lib-9.0.36-3.74.1
tomcat-servlet-4_0-api-9.0.36-3.74.1
tomcat-webapps-9.0.36-3.74.1

Описание

If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15-ESPOS:tomcat-9.0.36-3.74.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:tomcat-admin-webapps-9.0.36-3.74.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:tomcat-el-3_0-api-9.0.36-3.74.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:tomcat-jsp-2_3-api-9.0.36-3.74.1

Ссылки

Описание

While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15-ESPOS:tomcat-9.0.36-3.74.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:tomcat-admin-webapps-9.0.36-3.74.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:tomcat-el-3_0-api-9.0.36-3.74.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:tomcat-jsp-2_3-api-9.0.36-3.74.1

Ссылки
Уязвимость SUSE-SU-2021:0040-1