DSA-5522-1 tomcat9 -- security update

Related Vulnerabilities: CVE-2023-24998   CVE-2023-41080   CVE-2023-42795   CVE-2023-44487   CVE-2023-45648  

A regression was discovered in the Http2UpgradeHandler class of Tomcat 9 introduced by the patch to fix CVE-2023-44487 (Rapid Reset Attack). A wrong value for the overheadcount variable forced HTTP2 connections to close early. For the oldstable distribution (bullseye), this problem has been fixed in version 9.0.43-2~deb11u9. We recommend that you upgrade your tomcat9 packages. For the detailed security status of tomcat9 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tomcat9

Debian Security Advisory

DSA-5522-1 tomcat9 -- security update

Date Reported:
10 Oct 2023
Affected Packages:
tomcat9
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2023-24998, CVE-2023-41080, CVE-2023-42795, CVE-2023-44487, CVE-2023-45648.
More information:

A regression was discovered in the Http2UpgradeHandler class of Tomcat 9 introduced by the patch to fix CVE-2023-44487 (Rapid Reset Attack). A wrong value for the overheadcount variable forced HTTP2 connections to close early.

For the oldstable distribution (bullseye), this problem has been fixed in version 9.0.43-2~deb11u9.

We recommend that you upgrade your tomcat9 packages.

For the detailed security status of tomcat9 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tomcat9