ALASTOMCAT9-2023-001

Related Vulnerabilities: CVE-2023-28709  

The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur. (CVE-2023-28709)

ALASTOMCAT9-2023-001


Amazon Linux 2 Security Advisory: ALASTOMCAT9-2023-001
Advisory Release Date: 2023-08-04 20:33 Pacific
Advisory Updated Date: 2023-09-25 21:58 Pacific
Severity: Important

Issue Overview:

The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur. (CVE-2023-28709)


Affected Packages:

tomcat


Issue Correction:
Run yum update tomcat to update your system.

New Packages:
noarch:
    tomcat-9.0.76-1.amzn2.0.1.noarch
    tomcat-admin-webapps-9.0.76-1.amzn2.0.1.noarch
    tomcat-docs-webapp-9.0.76-1.amzn2.0.1.noarch
    tomcat-jsvc-9.0.76-1.amzn2.0.1.noarch
    tomcat-jsp-2.3-api-9.0.76-1.amzn2.0.1.noarch
    tomcat-lib-9.0.76-1.amzn2.0.1.noarch
    tomcat-servlet-4.0-api-9.0.76-1.amzn2.0.1.noarch
    tomcat-el-3.0-api-9.0.76-1.amzn2.0.1.noarch
    tomcat-webapps-9.0.76-1.amzn2.0.1.noarch

src:
    tomcat-9.0.76-1.amzn2.0.1.src