OESA-2024-1100

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1100
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2024-1100.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2024-1100
Upstream
Published
2024-01-26T11:06:51Z
Modified
2025-08-12T05:18:46.252778Z
Summary
tomcat security update
Details

The Apache Tomcat software is developed in an open and participatory environment and released under the Apache License version 2. The Apache Tomcat project is intended to be a collaboration of the best-of-breed developers from around the world. We invite you to participate in this open development project

Security Fix(es):

Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads.

Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured.

(CVE-2023-24998)

The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.

(CVE-2023-28709)

Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the current request/response to the next.

Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.

(CVE-2023-42795)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:20.03-LTS-SP1 / tomcat

Package

Name
tomcat
Purl
pkg:rpm/openEuler/tomcat&distro=openEuler-20.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.0.10-31.oe1

Ecosystem specific

{
    "src": [
        "tomcat-9.0.10-31.oe1.src.rpm"
    ],
    "noarch": [
        "tomcat-jsvc-9.0.10-31.oe1.noarch.rpm",
        "tomcat-9.0.10-31.oe1.noarch.rpm",
        "tomcat-help-9.0.10-31.oe1.noarch.rpm"
    ]
}

openEuler:20.03-LTS-SP4 / tomcat

Package

Name
tomcat
Purl
pkg:rpm/openEuler/tomcat&distro=openEuler-20.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.0.10-31.oe2003sp4

Ecosystem specific

{
    "src": [
        "tomcat-9.0.10-31.oe2003sp4.src.rpm"
    ],
    "noarch": [
        "tomcat-9.0.10-31.oe2003sp4.noarch.rpm",
        "tomcat-help-9.0.10-31.oe2003sp4.noarch.rpm",
        "tomcat-jsvc-9.0.10-31.oe2003sp4.noarch.rpm"
    ]
}

openEuler:22.03-LTS / tomcat

Package

Name
tomcat
Purl
pkg:rpm/openEuler/tomcat&distro=openEuler-22.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.0.10-33.oe2203sp3

Ecosystem specific

{
    "src": [
        "tomcat-9.0.10-31.oe2203.src.rpm",
        "tomcat-9.0.10-33.oe2203sp1.src.rpm",
        "tomcat-9.0.10-33.oe2203sp2.src.rpm",
        "tomcat-9.0.10-33.oe2203sp3.src.rpm"
    ],
    "noarch": [
        "tomcat-jsvc-9.0.10-31.oe2203.noarch.rpm",
        "tomcat-help-9.0.10-31.oe2203.noarch.rpm",
        "tomcat-9.0.10-31.oe2203.noarch.rpm",
        "tomcat-jsvc-9.0.10-33.oe2203sp1.noarch.rpm",
        "tomcat-9.0.10-33.oe2203sp1.noarch.rpm",
        "tomcat-help-9.0.10-33.oe2203sp1.noarch.rpm",
        "tomcat-help-9.0.10-33.oe2203sp2.noarch.rpm",
        "tomcat-9.0.10-33.oe2203sp2.noarch.rpm",
        "tomcat-jsvc-9.0.10-33.oe2203sp2.noarch.rpm",
        "tomcat-jsvc-9.0.10-33.oe2203sp3.noarch.rpm",
        "tomcat-help-9.0.10-33.oe2203sp3.noarch.rpm",
        "tomcat-9.0.10-33.oe2203sp3.noarch.rpm"
    ]
}

openEuler:22.03-LTS-SP1 / tomcat

Package

Name
tomcat
Purl
pkg:rpm/openEuler/tomcat&distro=openEuler-22.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.0.10-33.oe2203sp1

Ecosystem specific

{
    "src": [
        "tomcat-9.0.10-33.oe2203sp1.src.rpm"
    ],
    "noarch": [
        "tomcat-jsvc-9.0.10-33.oe2203sp1.noarch.rpm",
        "tomcat-9.0.10-33.oe2203sp1.noarch.rpm",
        "tomcat-help-9.0.10-33.oe2203sp1.noarch.rpm"
    ]
}

openEuler:22.03-LTS-SP2 / tomcat

Package

Name
tomcat
Purl
pkg:rpm/openEuler/tomcat&distro=openEuler-22.03-LTS-SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.0.10-33.oe2203sp2

Ecosystem specific

{
    "src": [
        "tomcat-9.0.10-33.oe2203sp2.src.rpm"
    ],
    "noarch": [
        "tomcat-help-9.0.10-33.oe2203sp2.noarch.rpm",
        "tomcat-9.0.10-33.oe2203sp2.noarch.rpm",
        "tomcat-jsvc-9.0.10-33.oe2203sp2.noarch.rpm"
    ]
}

openEuler:22.03-LTS-SP3 / tomcat

Package

Name
tomcat
Purl
pkg:rpm/openEuler/tomcat&distro=openEuler-22.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.0.10-33.oe2203sp3

Ecosystem specific

{
    "src": [
        "tomcat-9.0.10-33.oe2203sp3.src.rpm"
    ],
    "noarch": [
        "tomcat-jsvc-9.0.10-33.oe2203sp3.noarch.rpm",
        "tomcat-help-9.0.10-33.oe2203sp3.noarch.rpm",
        "tomcat-9.0.10-33.oe2203sp3.noarch.rpm"
    ]
}