• [SECURITY] [DSA 5521-1] tomcat10 security update

    From Markus Koschany@21:1/5 to All on Wed Oct 11 00:30:01 2023
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512

    - ------------------------------------------------------------------------- Debian Security Advisory DSA-5521-1 security@debian.org https://www.debian.org/security/ Markus Koschany October 10, 2023 https://www.debian.org/security/faq
    - -------------------------------------------------------------------------

    Package : tomcat10
    CVE ID : CVE-2023-28709 CVE-2023-41080 CVE-2023-42795 CVE-2023-44487
    CVE-2023-45648

    Several security vulnerabilities have been discovered in the Tomcat
    servlet and JSP engine.

    CVE-2023-28709

    Denial of Service. If non-default HTTP connector settings were used such
    that the maxParameterCount could be reached using query string parameters
    and a request was submitted that supplied exactly maxParameterCount
    parameters in the query string, the limit for uploaded request parts could
    be bypassed with the potential for a denial of service to occur.

    CVE-2023-41080

    Open redirect. If the ROOT (default) web application is configured to use
    FORM authentication then it is possible that a specially crafted URL could
    be used to trigger a redirect to an URL of the attackers choice.

    CVE-2023-42795

    Information Disclosure. When recycling various internal objects, including
    the request and the response, prior to re-use by the next request/response,
    an error could cause Tomcat to skip some parts of the recycling process
    leading to information leaking from the current request/response to the
    next.

    CVE-2023-44487

    DoS caused by HTTP/2 frame overhead (Rapid Reset Attack)

    CVE-2023-45648

    Request smuggling. Tomcat did not correctly parse HTTP trailer headers. A
    specially crafted, invalid trailer header could cause Tomcat to treat a
    single request as multiple requests leading to the possibility of request
    smuggling when behind a reverse proxy.

    For the stable distribution (bookworm), these problems have been fixed in version 10.1.6-1+deb12u1.

    We recommend that you upgrade your tomcat10 packages.

    For the detailed security status of tomcat10 please refer to
    its security tracker page at: https://security-tracker.debian.org/tracker/tomcat10

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/

    Mailing list: debian-security-announce@lists.debian.org
    -----BEGIN PGP SIGNATURE-----

    iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmUlygNfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeQOAw/9FphsARNkV5P4SoR3pQJ0CUaGtipdCc57ZR+w00QjR0/lbIQpoYzxrgAN zNJCDUuCDhEjyolzJ9XtkabKDzhZr/+1wM5iQQIx9A6VFELannL5ivZjT798juUx +IMCD65kMFXqLqIwS4BhYZww/W5KapZkgEeppyhpS3pjGXJ3nRtkAMpJZAJk4CCt n3I/9GzyI/8KQVBGAUPQb+feDJmDh/qSbHYTtvEweeu1WNiFGzU6MuRIOeYi6mga gzulx3NJgCHb6SGKdttqc51pSK2mRKUlQdgzwxS+jTaE4iDWv1AHaV/pJF6cS3cP xmELILWm7TqnL90on63u6Nh8UScSM0qf3ajRd2zAXDEtaGcdM92vbNLDfJTo1/wA pEH+xTkiOUpHEhsDEOW6zLoJqy0+qW9pQd3qE4Sh1CBVFylxR4L1JeDupyozH0up LLuNKslZLxUFUWYEkwFmtOoOMjlAtMsPnsgoVr/ZOPXaixLE05HgOWWWUV5YWyKW Ae2/C+Oc38P2bFNjW++okCsZTOaVdrhA/2g9cPNE17cN/o/Ff9GdbqDJMzry9z/B FSPIZ47QSzMROhc/9z5HL7Y3eqEj8kjG2LbMQ82lP5hHoYPhXwKjML8HhwmyLvD2 scn/9i/RzazIfyO+zLStzxEHIOR7xx95drm15Av1Z52oETSmsmc=
    =raMf
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)