cvrf2cusa/cvrf/2024/cvrf-openEuler-SA-2024-1100.xml
Jia Chao 0b34274085 git mv
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-25 09:57:37 +08:00

226 lines
14 KiB
XML
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
<DocumentTitle xml:lang="en">An update for tomcat is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP2 and openEuler-22.03-LTS-SP3</DocumentTitle>
<DocumentType>Security Advisory</DocumentType>
<DocumentPublisher Type="Vendor">
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
<IssuingAuthority>openEuler security committee</IssuingAuthority>
</DocumentPublisher>
<DocumentTracking>
<Identification>
<ID>openEuler-SA-2024-1100</ID>
</Identification>
<Status>Final</Status>
<Version>1.0</Version>
<RevisionHistory>
<Revision>
<Number>1.0</Number>
<Date>2024-01-26</Date>
<Description>Initial</Description>
</Revision>
</RevisionHistory>
<InitialReleaseDate>2024-01-26</InitialReleaseDate>
<CurrentReleaseDate>2024-01-26</CurrentReleaseDate>
<Generator>
<Engine>openEuler SA Tool V1.0</Engine>
<Date>2024-01-26</Date>
</Generator>
</DocumentTracking>
<DocumentNotes>
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">tomcat security update</Note>
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for tomcat is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP2 and openEuler-22.03-LTS-SP3.</Note>
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">The Apache Tomcat software is developed in an open and participatory environment and released under the Apache License version 2. The Apache Tomcat project is intended to be a collaboration of the best-of-breed developers from around the world. We invite you to participate in this open development project
Security Fix(es):
Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads.
Note that, like all of the file upload limits, the
new configuration option (FileUploadBase#setFileCountMax) is not
enabled by default and must be explicitly configured.
(CVE-2023-24998)
The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.
(CVE-2023-28709)
Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could
cause Tomcat to skip some parts of the recycling process leading to
information leaking from the current request/response to the next.
Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.
(CVE-2023-42795)</Note>
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for tomcat is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP2 and openEuler-22.03-LTS-SP3.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">tomcat</Note>
</DocumentNotes>
<DocumentReferences>
<Reference Type="Self">
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1100</URL>
</Reference>
<Reference Type="openEuler CVE">
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-24998</URL>
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-28709</URL>
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-42795</URL>
</Reference>
<Reference Type="Other">
<URL>https://nvd.nist.gov/vuln/detail/CVE-2023-24998</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2023-28709</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2023-42795</URL>
</Reference>
</DocumentReferences>
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
<Branch Type="Product Name" Name="openEuler">
<FullProductName ProductID="openEuler-20.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">openEuler-20.03-LTS-SP1</FullProductName>
<FullProductName ProductID="openEuler-20.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openEuler-20.03-LTS-SP4</FullProductName>
<FullProductName ProductID="openEuler-22.03-LTS" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">openEuler-22.03-LTS</FullProductName>
<FullProductName ProductID="openEuler-22.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">openEuler-22.03-LTS-SP1</FullProductName>
<FullProductName ProductID="openEuler-22.03-LTS-SP2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">openEuler-22.03-LTS-SP2</FullProductName>
<FullProductName ProductID="openEuler-22.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">openEuler-22.03-LTS-SP3</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="noarch">
<FullProductName ProductID="tomcat-jsvc-9.0.10-31" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">tomcat-jsvc-9.0.10-31.oe1.noarch.rpm</FullProductName>
<FullProductName ProductID="tomcat-9.0.10-31" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">tomcat-9.0.10-31.oe1.noarch.rpm</FullProductName>
<FullProductName ProductID="tomcat-help-9.0.10-31" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">tomcat-help-9.0.10-31.oe1.noarch.rpm</FullProductName>
<FullProductName ProductID="tomcat-9.0.10-31" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">tomcat-9.0.10-31.oe2003sp4.noarch.rpm</FullProductName>
<FullProductName ProductID="tomcat-help-9.0.10-31" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">tomcat-help-9.0.10-31.oe2003sp4.noarch.rpm</FullProductName>
<FullProductName ProductID="tomcat-jsvc-9.0.10-31" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">tomcat-jsvc-9.0.10-31.oe2003sp4.noarch.rpm</FullProductName>
<FullProductName ProductID="tomcat-jsvc-9.0.10-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">tomcat-jsvc-9.0.10-31.oe2203.noarch.rpm</FullProductName>
<FullProductName ProductID="tomcat-help-9.0.10-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">tomcat-help-9.0.10-31.oe2203.noarch.rpm</FullProductName>
<FullProductName ProductID="tomcat-9.0.10-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">tomcat-9.0.10-31.oe2203.noarch.rpm</FullProductName>
<FullProductName ProductID="tomcat-jsvc-9.0.10-33" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">tomcat-jsvc-9.0.10-33.oe2203sp1.noarch.rpm</FullProductName>
<FullProductName ProductID="tomcat-9.0.10-33" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">tomcat-9.0.10-33.oe2203sp1.noarch.rpm</FullProductName>
<FullProductName ProductID="tomcat-help-9.0.10-33" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">tomcat-help-9.0.10-33.oe2203sp1.noarch.rpm</FullProductName>
<FullProductName ProductID="tomcat-help-9.0.10-33" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">tomcat-help-9.0.10-33.oe2203sp2.noarch.rpm</FullProductName>
<FullProductName ProductID="tomcat-9.0.10-33" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">tomcat-9.0.10-33.oe2203sp2.noarch.rpm</FullProductName>
<FullProductName ProductID="tomcat-jsvc-9.0.10-33" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">tomcat-jsvc-9.0.10-33.oe2203sp2.noarch.rpm</FullProductName>
<FullProductName ProductID="tomcat-jsvc-9.0.10-33" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">tomcat-jsvc-9.0.10-33.oe2203sp3.noarch.rpm</FullProductName>
<FullProductName ProductID="tomcat-help-9.0.10-33" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">tomcat-help-9.0.10-33.oe2203sp3.noarch.rpm</FullProductName>
<FullProductName ProductID="tomcat-9.0.10-33" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">tomcat-9.0.10-33.oe2203sp3.noarch.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="src">
<FullProductName ProductID="tomcat-9.0.10-31" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">tomcat-9.0.10-31.oe1.src.rpm</FullProductName>
<FullProductName ProductID="tomcat-9.0.10-31" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">tomcat-9.0.10-31.oe2003sp4.src.rpm</FullProductName>
<FullProductName ProductID="tomcat-9.0.10-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">tomcat-9.0.10-31.oe2203.src.rpm</FullProductName>
<FullProductName ProductID="tomcat-9.0.10-33" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">tomcat-9.0.10-33.oe2203sp1.src.rpm</FullProductName>
<FullProductName ProductID="tomcat-9.0.10-33" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">tomcat-9.0.10-33.oe2203sp2.src.rpm</FullProductName>
<FullProductName ProductID="tomcat-9.0.10-33" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">tomcat-9.0.10-33.oe2203sp3.src.rpm</FullProductName>
</Branch>
</ProductTree>
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads.Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured.</Note>
</Notes>
<ReleaseDate>2024-01-26</ReleaseDate>
<CVE>CVE-2023-24998</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
<ProductID>openEuler-20.03-LTS-SP4</ProductID>
<ProductID>openEuler-22.03-LTS</ProductID>
<ProductID>openEuler-22.03-LTS-SP1</ProductID>
<ProductID>openEuler-22.03-LTS-SP2</ProductID>
<ProductID>openEuler-22.03-LTS-SP3</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>7.5</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>tomcat security update</Description>
<DATE>2024-01-26</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1100</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="2" xml:lang="en">The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.</Note>
</Notes>
<ReleaseDate>2024-01-26</ReleaseDate>
<CVE>CVE-2023-28709</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
<ProductID>openEuler-20.03-LTS-SP4</ProductID>
<ProductID>openEuler-22.03-LTS</ProductID>
<ProductID>openEuler-22.03-LTS-SP1</ProductID>
<ProductID>openEuler-22.03-LTS-SP2</ProductID>
<ProductID>openEuler-22.03-LTS-SP3</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>7.5</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>tomcat security update</Description>
<DATE>2024-01-26</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1100</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="3" xml:lang="en">Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the current request/response to the next.Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.</Note>
</Notes>
<ReleaseDate>2024-01-26</ReleaseDate>
<CVE>CVE-2023-42795</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
<ProductID>openEuler-20.03-LTS-SP4</ProductID>
<ProductID>openEuler-22.03-LTS</ProductID>
<ProductID>openEuler-22.03-LTS-SP1</ProductID>
<ProductID>openEuler-22.03-LTS-SP2</ProductID>
<ProductID>openEuler-22.03-LTS-SP3</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>Medium</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>5.3</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>tomcat security update</Description>
<DATE>2024-01-26</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1100</URL>
</Remediation>
</Remediations>
</Vulnerability>
</cvrfdoc>