|
|
Subscribe / Log in / New account

Mageia alert MGASA-2021-0020 (tomcat)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2021-0020: Updated tomcat packages fix security vulnerability
Date:  Sun, 10 Jan 2021 20:47:25 +0100
Message-ID:  <20210110194725.2AEDE9F736@duvel.mageia.org>
Archive-link:  Article

MGASA-2021-0020 - Updated tomcat packages fix security vulnerability Publication date: 10 Jan 2021 URL: https://advisories.mageia.org/MGASA-2021-0020.html Type: security Affected Mageia releases: 7 CVE: CVE-2020-17527 Description: While investigating Apache issue 64830 it was discovered that Apache Tomcat could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests (CVE-2020-17527). The tomcat package has been updated to version 9.0.39, and patched to fix this issue. References: - https://bugs.mageia.org/show_bug.cgi?id=27739 - http://tomcat.apache.org/security-9.html#Fixed_in_Apache_... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1... SRPMS: - 7/core/tomcat-9.0.39-1.mga7


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds