Lucene search

K
debianDebianDEBIAN:DLA-3617-2:35B4C
HistoryOct 16, 2023 - 10:23 p.m.

[SECURITY] [DLA 3617-2] tomcat9 regression update

2023-10-1622:23:23
lists.debian.org
18
http2
security tracker
tomcat9 update
debian 10 buster
cve-2023-44487 fix

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

8.3

Confidence

High

EPSS

0.708

Percentile

98.1%


Debian LTS Advisory DLA-3617-2 [email protected]
https://www.debian.org/lts/security/ Markus Koschany
October 17, 2023 https://wiki.debian.org/LTS

Package : tomcat9
Version : 9.0.31-1~deb10u10
CVE ID : CVE-2023-44487

A regression was discovered in the Http2UpgradeHandler class of Tomcat 9
introduced by the patch to fix CVE-2023-44487 (Rapid Reset Attack). A wrong
value for the overheadcount variable forced HTTP2 connections to close early.

For Debian 10 buster, this problem has been fixed in version
9.0.31-1~deb10u10.

We recommend that you upgrade your tomcat9 packages.

For the detailed security status of tomcat9 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/tomcat9

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: This is a digitally signed message part

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

8.3

Confidence

High

EPSS

0.708

Percentile

98.1%