摘要:
tomcat security update
安全等级: High
公告ID: KylinSec-SA-2024-1039
发布日期: 2024年1月26日
The Apache Tomcat software is developed in an open and participatory environment and released under the Apache License version 2. The Apache Tomcat project is intended to be a collaboration of the best-of-breed developers from around the world. We invite you to participate in this open development project
Security Fix(es):
Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads.
Note that, like all of the file upload limits, the
new configuration option (FileUploadBase#setFileCountMax) is not
enabled by default and must be explicitly configured.
(CVE-2023-24998)
The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.
(CVE-2023-28709)
Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could
cause Tomcat to skip some parts of the recycling process leading to
information leaking from the current request/response to the next.
Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.
(CVE-2023-42795)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2023-24998 | KY3.4-4A | tomcat | Fixed |
CVE-2023-24998 | KY3.4-5A | tomcat | Fixed |
CVE-2023-24998 | KY3.5.1 | tomcat | Fixed |
CVE-2023-24998 | KY3.5.2 | tomcat | Fixed |
CVE-2023-28709 | KY3.4-4A | tomcat | Fixed |
CVE-2023-28709 | KY3.4-5A | tomcat | Fixed |
CVE-2023-28709 | KY3.5.1 | tomcat | Fixed |
CVE-2023-28709 | KY3.5.2 | tomcat | Fixed |
CVE-2023-42795 | KY3.4-4A | tomcat | Fixed |
CVE-2023-42795 | KY3.4-5A | tomcat | Fixed |
CVE-2023-42795 | KY3.5.1 | tomcat | Fixed |
CVE-2023-42795 | KY3.5.2 | tomcat | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
tomcat-jsvc | noarch | 9.0.10-31.kb1.ky3_5 |
tomcat-help | noarch | 9.0.10-31.kb1.ky3_5 |
tomcat | noarch | 9.0.10-31.kb1.ky3_5 |
软件名称 | 架构 | 版本号 |
---|---|---|
tomcat-jsvc | noarch | 9.0.10-31.kb1.ky3_4 |
tomcat | noarch | 9.0.10-31.kb1.ky3_4 |
tomcat-help | noarch | 9.0.10-31.kb1.ky3_4 |
软件名称 | 架构 | 版本号 |
---|---|---|
tomcat | noarch | 9.0.10-31.kb1.ky3_4 |
tomcat-help | noarch | 9.0.10-31.kb1.ky3_4 |
tomcat-jsvc | noarch | 9.0.10-31.kb1.ky3_4 |
软件名称 | 架构 | 版本号 |
---|---|---|
tomcat-jsvc | noarch | 9.0.10-33.ky3_5 |
tomcat | noarch | 9.0.10-33.ky3_5 |
tomcat-help | noarch | 9.0.10-33.ky3_5 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名