Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2024:0206-1

Опубликовано: 24 янв. 2024
Источник: suse-cvrf

Описание

Security update for tomcat

This update for tomcat fixes the following issues:

Security fixes:

  • CVE-2023-46589: Fixed HTTP request smuggling due to incorrect headers parsing. (bsc#1217649)

Other fixes:

  • Streamline how patches are handled in the spec file of the package

Список пакетов

SUSE Linux Enterprise Server 12 SP5
tomcat-9.0.36-3.118.1
tomcat-admin-webapps-9.0.36-3.118.1
tomcat-docs-webapp-9.0.36-3.118.1
tomcat-el-3_0-api-9.0.36-3.118.1
tomcat-javadoc-9.0.36-3.118.1
tomcat-jsp-2_3-api-9.0.36-3.118.1
tomcat-lib-9.0.36-3.118.1
tomcat-servlet-4_0-api-9.0.36-3.118.1
tomcat-webapps-9.0.36-3.118.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
tomcat-9.0.36-3.118.1
tomcat-admin-webapps-9.0.36-3.118.1
tomcat-docs-webapp-9.0.36-3.118.1
tomcat-el-3_0-api-9.0.36-3.118.1
tomcat-javadoc-9.0.36-3.118.1
tomcat-jsp-2_3-api-9.0.36-3.118.1
tomcat-lib-9.0.36-3.118.1
tomcat-servlet-4_0-api-9.0.36-3.118.1
tomcat-webapps-9.0.36-3.118.1

Описание

Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82 and from 8.5.0 through 8.5.95 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Users are recommended to upgrade to version 11.0.0-M11 onwards, 10.1.16 onwards, 9.0.83 onwards or 8.5.96 onwards, which fix the issue.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP5:tomcat-9.0.36-3.118.1
SUSE Linux Enterprise Server 12 SP5:tomcat-admin-webapps-9.0.36-3.118.1
SUSE Linux Enterprise Server 12 SP5:tomcat-docs-webapp-9.0.36-3.118.1
SUSE Linux Enterprise Server 12 SP5:tomcat-el-3_0-api-9.0.36-3.118.1

Ссылки