• 公告ID (KylinSec-SA-2024-1039)

摘要:

tomcat security update

安全等级: High

公告ID: KylinSec-SA-2024-1039

发布日期: 2024年1月26日

关联CVE: CVE-2023-24998   CVE-2023-28709   CVE-2023-42795  

  • 详细介绍

1. 漏洞描述

   

The Apache Tomcat software is developed in an open and participatory environment and released under the Apache License version 2. The Apache Tomcat project is intended to be a collaboration of the best-of-breed developers from around the world. We invite you to participate in this open development project

Security Fix(es):

Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads.




Note that, like all of the file upload limits, the
new configuration option (FileUploadBase#setFileCountMax) is not
enabled by default and must be explicitly configured.


(CVE-2023-24998)

The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.




(CVE-2023-28709)

Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could
cause Tomcat to skip some parts of the recycling process leading to
information leaking from the current request/response to the next.

Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.

(CVE-2023-42795)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2023-24998 KY3.4-4A tomcat Fixed
CVE-2023-24998 KY3.4-5A tomcat Fixed
CVE-2023-24998 KY3.5.1 tomcat Fixed
CVE-2023-24998 KY3.5.2 tomcat Fixed
CVE-2023-28709 KY3.4-4A tomcat Fixed
CVE-2023-28709 KY3.4-5A tomcat Fixed
CVE-2023-28709 KY3.5.1 tomcat Fixed
CVE-2023-28709 KY3.5.2 tomcat Fixed
CVE-2023-42795 KY3.4-4A tomcat Fixed
CVE-2023-42795 KY3.4-5A tomcat Fixed
CVE-2023-42795 KY3.5.1 tomcat Fixed
CVE-2023-42795 KY3.5.2 tomcat Fixed

3. 影响组件

    tomcat

4. 修复版本

   

KY3.5.1

软件名称 架构 版本号
tomcat-jsvc noarch 9.0.10-31.kb1.ky3_5
tomcat-help noarch 9.0.10-31.kb1.ky3_5
tomcat noarch 9.0.10-31.kb1.ky3_5

KY3.4-4A

软件名称 架构 版本号
tomcat-jsvc noarch 9.0.10-31.kb1.ky3_4
tomcat noarch 9.0.10-31.kb1.ky3_4
tomcat-help noarch 9.0.10-31.kb1.ky3_4

KY3.4-5A

软件名称 架构 版本号
tomcat noarch 9.0.10-31.kb1.ky3_4
tomcat-help noarch 9.0.10-31.kb1.ky3_4
tomcat-jsvc noarch 9.0.10-31.kb1.ky3_4

KY3.5.2

软件名称 架构 版本号
tomcat-jsvc noarch 9.0.10-33.ky3_5
tomcat noarch 9.0.10-33.ky3_5
tomcat-help noarch 9.0.10-33.ky3_5

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

KY3.5.1:

x86_64:

     tomcat-jsvc   

     tomcat-help   

     tomcat   

aarch64:

     tomcat-jsvc   

     tomcat-help   

     tomcat   

KY3.4-4A:

x86_64:

     tomcat-jsvc   

     tomcat   

     tomcat-help   

aarch64:

     tomcat-jsvc   

     tomcat   

     tomcat-help   

KY3.4-5A:

x86_64:

     tomcat   

     tomcat-help   

     tomcat-jsvc   

aarch64:

     tomcat   

     tomcat-help   

     tomcat-jsvc   

KY3.5.2:

x86_64:

     tomcat-jsvc   

     tomcat   

     tomcat-help   

aarch64:

     tomcat-jsvc   

     tomcat   

     tomcat-help   

上一篇:KylinSec-SA-2024-1244 下一篇:KylinSec-SA-2024-1040