-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Wed, 11 Oct 2023 17:17:28 +0200 Source: tomcat9 Architecture: source Version: 9.0.31-1~deb10u9 Distribution: buster-security Urgency: high Maintainer: Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org> Changed-By: Markus Koschany <apo@debian.org> Changes: tomcat9 (9.0.31-1~deb10u9) buster-security; urgency=high . * Team upload. * Fix CVE-2023-45648: Request smuggling. Tomcat did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. * Fix CVE-2023-44487: DoS caused by HTTP/2 frame overhead (Rapid Reset Attack) * Fix CVE-2023-42795: Information Disclosure. When recycling various internal objects, including the request and the response, prior to re-use by the next request/response, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the current request/response to the next. * Fix CVE-2023-41080: Open redirect. If the ROOT (default) web application is configured to use FORM authentication then it is possible that a specially crafted URL could be used to trigger a redirect to an URL of the attackers choice. * Fix CVE-2023-28709: Denial of Service. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur. * Fix CVE-2023-24998: Denial of service. Tomcat uses a packaged renamed copy of Apache Commons FileUpload to provide the file upload functionality defined in the Jakarta Servlet specification. Apache Tomcat was, therefore, also vulnerable to the Commons FileUpload vulnerability CVE-2023-24998 as there was no limit to the number of request parts processed. This resulted in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Checksums-Sha1: be1a91127c925bff9398b028187863142d1c5028 2889 tomcat9_9.0.31-1~deb10u9.dsc 7acc59a6b065a01a67723034c0f70456e2d497ac 62172 tomcat9_9.0.31-1~deb10u9.debian.tar.xz e56bca45da057f26e09edb562eb3885217b9c7a5 13947 tomcat9_9.0.31-1~deb10u9_source.buildinfo Checksums-Sha256: 21cdf39eedeb61f5a130ce1574276e585f3aae1997006c48a0238b12fc426e5f 2889 tomcat9_9.0.31-1~deb10u9.dsc 503843444c894b47be1193c63beb9cdcbcaab5d0188cef4d9db5d30c29a320cd 62172 tomcat9_9.0.31-1~deb10u9.debian.tar.xz b6c2c35a3b388028fc3e1c0bc8eb2e3f56d441cf85c76de973e81aa6e61a1d3b 13947 tomcat9_9.0.31-1~deb10u9_source.buildinfo Files: 09847a3187230748fd3924f119c1e97b 2889 java optional tomcat9_9.0.31-1~deb10u9.dsc 11b612d951f3cfc26a864cb7a989ff0f 62172 java optional tomcat9_9.0.31-1~deb10u9.debian.tar.xz b71a7e2c32258ef92522fcbf98be3552 13947 java optional tomcat9_9.0.31-1~deb10u9_source.buildinfo -----BEGIN PGP SIGNATURE----- iQKjBAEBCgCNFiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmUpEGdfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQPHGFwb0BkZWJp YW4ub3JnAAoJENmtFLlRO1HklWsQAMiEyAFQIhg2oW19laH66rkWGPGPIkWVD9N5 7GspU2WFfuvbBYs+iAq5jD/rijKVMoH+dr471h1rOnTWjh+P7f0hJrNnDyLKVAX5 iPqQxqLNxP/blb0U8wg0z/H5rDMhTx/qFVDYeu0VdNIQkO8mF/wXJahDtq2jkTx0 ANVjcJgHTNwdntiNsH0sN+6spxvgK96YptiTMj3l1o9SFQBkXTYkQKepRbPTje4P C25JqZT6e4p3B0Z+uPaLoAG9vnaoihudl2JHlmL7wH7FcHHPo7LqTXOAAB+RRYrX hhKCyKUCclVFVVQzK4ApyN6vClcwbS0JdgYeUcBWbLeLmUGLWSAqGlzJEjxd9CW8 f6Aorb0U1Rmd30S9jA7KdTad4RSx95z0zYKRI3ooKkZQSOoApfu2SnTflKonp38C tAA4nD+wIFC/7qA4Bkxr1wnTVioQr1k5U4E7n3gbTTpJtUojqfO+dQnGAVfWM8CI 2RD5J0Oyb+UOb7qgUuS1FruAQTIykU5EnmjDTo4u0ebpDTLjMNcFv5e4UzKkOmUb SsAa+VIutbrKihThXPgCJ4aUaIPFW80xhBPne5Ci3QUdf/aKi/E67q2LqFVgTLSr hbRTZkw0WwEcUwosmkz3Dzuv6Dm/qD9O6eU5zMpe59SJ4vU86R6CkgFX3ovkipkI ZqEOWE5m =+lhV -----END PGP SIGNATURE-----