MGASA-2023-0138

Source
https://advisories.mageia.org/MGASA-2023-0138.html
Import Source
https://advisories.mageia.org/MGASA-2023-0138.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2023-0138
Related
Published
2023-04-15T19:03:44Z
Modified
2023-04-15T17:48:37Z
Summary
Updated tomcat packages fix security vulnerability
Details

Information disclosure due to concurrency bug (CVE-2021-43980) Fix for CVE-2020-9484 introduced a time of check, time of use vulnerability (CVE-2022-23181) Correct documentation to warn of use over untrusted networks. (CVE-2022-29885) Correct documentation showing use of XSS vulnerability. (CVE-2022-34305) Fix to reject invalid Content-Length header (CVE-2022-42252) Fix escaping of the type, message or description values. (CVE-2022-45143) Fix FileUpload limiting of the number of request parts to be processed to prevent the possibility of an attacker triggering a DoS (CVE-2023-24998) Fix setting of session cookie secure attribute when using RemoteIpFilter with X-Forwarded-Proto header set to https (CVE-2023-28708) Obsolete tomcat-jsvc

References
Credits

Affected packages

Mageia:8 / tomcat

Package

Name
tomcat
Purl
pkg:rpm/mageia/tomcat?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.0.73-1.1.mga8

Ecosystem specific

{
    "section": "core"
}