Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2021:0042-1

Опубликовано: 07 янв. 2021
Источник: suse-cvrf

Описание

Security update for tomcat

This update for tomcat fixes the following issue:

  • CVE-2020-17527: Fixed a HTTP/2 request header mix-up (bsc#1179602).

Список пакетов

Image SLES15-SP1-Manager-4-0-Azure-BYOS-Server
tomcat-9.0.36-4.53.1
tomcat-el-3_0-api-9.0.36-4.53.1
tomcat-jsp-2_3-api-9.0.36-4.53.1
tomcat-lib-9.0.36-4.53.1
tomcat-servlet-4_0-api-9.0.36-4.53.1
Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Server
tomcat-9.0.36-4.53.1
tomcat-el-3_0-api-9.0.36-4.53.1
tomcat-jsp-2_3-api-9.0.36-4.53.1
tomcat-lib-9.0.36-4.53.1
tomcat-servlet-4_0-api-9.0.36-4.53.1
Image SLES15-SP1-Manager-4-0-GCE-BYOS-Server
tomcat-9.0.36-4.53.1
tomcat-el-3_0-api-9.0.36-4.53.1
tomcat-jsp-2_3-api-9.0.36-4.53.1
tomcat-lib-9.0.36-4.53.1
tomcat-servlet-4_0-api-9.0.36-4.53.1
SUSE Linux Enterprise Module for Web and Scripting 15 SP1
tomcat-9.0.36-4.53.1
tomcat-admin-webapps-9.0.36-4.53.1
tomcat-el-3_0-api-9.0.36-4.53.1
tomcat-jsp-2_3-api-9.0.36-4.53.1
tomcat-lib-9.0.36-4.53.1
tomcat-servlet-4_0-api-9.0.36-4.53.1
tomcat-webapps-9.0.36-4.53.1

Описание

While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.


Затронутые продукты
Image SLES15-SP1-Manager-4-0-Azure-BYOS-Server:tomcat-9.0.36-4.53.1
Image SLES15-SP1-Manager-4-0-Azure-BYOS-Server:tomcat-el-3_0-api-9.0.36-4.53.1
Image SLES15-SP1-Manager-4-0-Azure-BYOS-Server:tomcat-jsp-2_3-api-9.0.36-4.53.1
Image SLES15-SP1-Manager-4-0-Azure-BYOS-Server:tomcat-lib-9.0.36-4.53.1

Ссылки