MGASA-2024-0267

Source
https://advisories.mageia.org/MGASA-2024-0267.html
Import Source
https://advisories.mageia.org/MGASA-2024-0267.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2024-0267
Related
Published
2024-07-15T16:54:48Z
Modified
2024-07-15T16:29:17Z
Summary
Updated tomcat packages fix security vulnerability
Details

Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed. (CVE-2024-34750)

References
Credits

Affected packages

Mageia:9 / tomcat

Package

Name
tomcat
Purl
pkg:rpm/mageia/tomcat?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.0.90-1.mga9

Ecosystem specific

{
    "section": "core"
}