Mageia alert MGASA-2021-0020 (tomcat)
| From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
| To: | updates-announce@ml.mageia.org | |
| Subject: | [updates-announce] MGASA-2021-0020: Updated tomcat packages fix security vulnerability | |
| Date: | Sun, 10 Jan 2021 20:47:25 +0100 | |
| Message-ID: | <20210110194725.2AEDE9F736@duvel.mageia.org> | |
| Archive-link: | Article | 
MGASA-2021-0020 - Updated tomcat packages fix security vulnerability Publication date: 10 Jan 2021 URL: https://advisories.mageia.org/MGASA-2021-0020.html Type: security Affected Mageia releases: 7 CVE: CVE-2020-17527 Description: While investigating Apache issue 64830 it was discovered that Apache Tomcat could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests (CVE-2020-17527). The tomcat package has been updated to version 9.0.39, and patched to fix this issue. References: - https://bugs.mageia.org/show_bug.cgi?id=27739 - http://tomcat.apache.org/security-9.html#Fixed_in_Apache_... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1... SRPMS: - 7/core/tomcat-9.0.39-1.mga7
           