Action not permitted
Modal body text goes here.
cve-2024-34750
Vulnerability from cvelistv5
Published
2024-07-03 19:32
Modified
2024-08-16 17:02
Severity ?
EPSS score ?
Summary
Apache Tomcat: HTTP/2 excess header handling DoS
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache Tomcat |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "tomcat", "vendor": "apache", "versions": [ { "lessThanOrEqual": "9.0.89", "status": "affected", "version": "9.0.0-m1", "versionType": "semver" }, { "lessThanOrEqual": "10.1.24", "status": "affected", "version": "10.1.0-m1", "versionType": "semver" }, { "lessThanOrEqual": "11.0.0-m20", "status": "affected", "version": "11.0.0-m1", "versionType": "semver" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-34750", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-08T16:51:20.954347Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-13T16:05:56.107Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-16T17:02:39.887Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l" }, { "url": "https://security.netapp.com/advisory/ntap-20240816-0004/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache Tomcat", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "11.0.0-M20", "status": "affected", "version": "11.0.0-M1", "versionType": "semver" }, { "lessThanOrEqual": "10.1.24", "status": "affected", "version": "10.1.0-M1", "versionType": "semver" }, { "lessThanOrEqual": "9.0.89", "status": "affected", "version": "9.0.0-M1", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "devme4f from VNPT-VCI" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eImproper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed.\u003c/p\u003e\u003cp\u003eThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89.\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.\u003c/p\u003e" } ], "value": "Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89.\n\nUsers are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.\n\n" } ], "metrics": [ { "other": { "content": { "text": "important" }, "type": "Textual description of severity" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-755", "description": "CWE-755 Improper Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-03T19:32:34.695Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l" } ], "source": { "discovery": "EXTERNAL" }, "title": "Apache Tomcat: HTTP/2 excess header handling DoS", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2024-34750", "datePublished": "2024-07-03T19:32:34.695Z", "dateReserved": "2024-05-08T07:23:16.760Z", "dateUpdated": "2024-08-16T17:02:39.887Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-34750\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2024-07-03T20:15:04.083\",\"lastModified\":\"2024-07-09T16:22:37.120\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed.\\n\\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89.\\n\\nUsers are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.\\n\\n\"},{\"lang\":\"es\",\"value\":\"Manejo inadecuado de condiciones excepcionales, vulnerabilidad de consumo incontrolado de recursos en Apache Tomcat. Al procesar una secuencia HTTP/2, Tomcat no manej\u00f3 correctamente algunos casos de encabezados HTTP excesivos. Esto llev\u00f3 a un conteo err\u00f3neo de flujos HTTP/2 activos que a su vez llev\u00f3 al uso de un tiempo de espera infinito incorrecto que permiti\u00f3 que las conexiones permanecieran abiertas y que deber\u00edan haberse cerrado. Este problema afecta a Apache Tomcat: desde 11.0.0-M1 hasta 11.0.0-M20, desde 10.1.0-M1 hasta 10.1.24, desde 9.0.0-M1 hasta 9.0.89. Se recomienda a los usuarios actualizar a la versi\u00f3n 11.0.0-M21, 10.1.25 o 9.0.90, que soluciona el problema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"},{\"lang\":\"en\",\"value\":\"CWE-755\"}]}],\"references\":[{\"url\":\"https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l\",\"source\":\"security@apache.org\"}]}}" } }
rhsa-2024_4976
Vulnerability from csaf_redhat
Published
2024-08-06 13:50
Modified
2024-10-30 08:27
Summary
Red Hat Security Advisory: Red Hat JBoss Web Server 6.0.3 release and security update
Notes
Topic
An update is now available for Red Hat JBoss Web Server 6.0.3 on Red Hat Enterprise Linux versions 8 and 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.
This release of Red Hat JBoss Web Server 6.0.3 serves as a replacement for Red Hat JBoss Web Server 6.0.2. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes that are linked to in the References section.
Security Fix(es):
* jws6-tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750)
* jws6-tomcat: Denial of Service in Tomcat (CVE-2024-38286)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Web Server 6.0.3 on Red Hat Enterprise Linux versions 8 and 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 6.0.3 serves as a replacement for Red Hat JBoss Web Server 6.0.2. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes that are linked to in the References section.\n\nSecurity Fix(es):\n\n* jws6-tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750)\n* jws6-tomcat: Denial of Service in Tomcat (CVE-2024-38286)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4976", "url": "https://access.redhat.com/errata/RHSA-2024:4976" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/6.0/html-single/red_hat_jboss_web_server_6.0_service_pack_3_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/6.0/html-single/red_hat_jboss_web_server_6.0_service_pack_3_release_notes/index" }, { "category": "external", "summary": "2295651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295651" }, { "category": "external", "summary": "2314686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314686" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4976.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 6.0.3 release and security update", "tracking": { "current_release_date": "2024-10-30T08:27:05+00:00", "generator": { "date": "2024-10-30T08:27:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.0" } }, "id": "RHSA-2024:4976", "initial_release_date": "2024-08-06T13:50:14+00:00", "revision_history": [ { "date": "2024-08-06T13:50:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-01T11:42:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-10-30T08:27:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 6.0 for RHEL 8", "product": { "name": "Red Hat JBoss Web Server 6.0 for RHEL 8", "product_id": "8Base-JWS-6.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:6.0::el8" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Server 6.0 for RHEL 9", "product": { "name": "Red Hat JBoss Web Server 6.0 for RHEL 9", "product_id": "9Base-JWS-6.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:6.0::el9" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" }, { "branches": [ { "category": "product_version", "name": "jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.src", "product": { "name": "jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.src", "product_id": "jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat@10.1.8-10.redhat_00018.1.el8jws?arch=src" } } }, { "category": "product_version", "name": "jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.src", "product": { "name": "jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.src", "product_id": "jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat@10.1.8-10.redhat_00018.1.el9jws?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product": { "name": "jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product_id": "jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat@10.1.8-10.redhat_00018.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product": { "name": "jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product_id": "jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-admin-webapps@10.1.8-10.redhat_00018.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product": { "name": "jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product_id": "jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-docs-webapp@10.1.8-10.redhat_00018.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product": { "name": "jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product_id": "jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-el-5.0-api@10.1.8-10.redhat_00018.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product": { "name": "jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product_id": "jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-javadoc@10.1.8-10.redhat_00018.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product": { "name": "jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product_id": "jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-jsp-3.1-api@10.1.8-10.redhat_00018.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product": { "name": "jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product_id": "jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-lib@10.1.8-10.redhat_00018.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product": { "name": "jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product_id": "jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-selinux@10.1.8-10.redhat_00018.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product": { "name": "jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product_id": "jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-servlet-6.0-api@10.1.8-10.redhat_00018.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product": { "name": "jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product_id": "jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-webapps@10.1.8-10.redhat_00018.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product": { "name": "jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product_id": "jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat@10.1.8-10.redhat_00018.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product": { "name": "jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product_id": "jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-admin-webapps@10.1.8-10.redhat_00018.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product": { "name": "jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product_id": "jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-docs-webapp@10.1.8-10.redhat_00018.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product": { "name": "jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product_id": "jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-el-5.0-api@10.1.8-10.redhat_00018.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product": { "name": "jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product_id": "jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-javadoc@10.1.8-10.redhat_00018.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product": { "name": "jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product_id": "jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-jsp-3.1-api@10.1.8-10.redhat_00018.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product": { "name": "jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product_id": "jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-lib@10.1.8-10.redhat_00018.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product": { "name": "jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product_id": "jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-selinux@10.1.8-10.redhat_00018.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product": { "name": "jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product_id": "jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-servlet-6.0-api@10.1.8-10.redhat_00018.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product": { "name": "jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product_id": "jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-webapps@10.1.8-10.redhat_00018.1.el9jws?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.0 for RHEL 8", "product_id": "8Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.src as a component of Red Hat JBoss Web Server 6.0 for RHEL 8", "product_id": "8Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.src" }, "product_reference": "jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.src", "relates_to_product_reference": "8Base-JWS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.0 for RHEL 8", "product_id": "8Base-JWS-6.0:jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.0 for RHEL 8", "product_id": "8Base-JWS-6.0:jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.0 for RHEL 8", "product_id": "8Base-JWS-6.0:jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.0 for RHEL 8", "product_id": "8Base-JWS-6.0:jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.0 for RHEL 8", "product_id": "8Base-JWS-6.0:jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.0 for RHEL 8", "product_id": "8Base-JWS-6.0:jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.0 for RHEL 8", "product_id": "8Base-JWS-6.0:jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.0 for RHEL 8", "product_id": "8Base-JWS-6.0:jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.0 for RHEL 8", "product_id": "8Base-JWS-6.0:jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.0 for RHEL 9", "product_id": "9Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.src as a component of Red Hat JBoss Web Server 6.0 for RHEL 9", "product_id": "9Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.src" }, "product_reference": "jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.src", "relates_to_product_reference": "9Base-JWS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.0 for RHEL 9", "product_id": "9Base-JWS-6.0:jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.0 for RHEL 9", "product_id": "9Base-JWS-6.0:jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.0 for RHEL 9", "product_id": "9Base-JWS-6.0:jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.0 for RHEL 9", "product_id": "9Base-JWS-6.0:jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.0 for RHEL 9", "product_id": "9Base-JWS-6.0:jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.0 for RHEL 9", "product_id": "9Base-JWS-6.0:jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.0 for RHEL 9", "product_id": "9Base-JWS-6.0:jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.0 for RHEL 9", "product_id": "9Base-JWS-6.0:jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.0 for RHEL 9", "product_id": "9Base-JWS-6.0:jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-34750", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "discovery_date": "2024-07-03T20:41:10+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295651" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This issue led to a miscounting of active HTTP/2 streams, which in turn led to using an incorrect infinite timeout that allowed connections to remain open that should have been closed.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Improper Handling of Exceptional Conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability in Apache Tomcat is significant due to its impact on the stability and security of web applications relying on HTTP/2. The improper handling of excessive HTTP headers during HTTP/2 stream processing leads to an inaccurate count of active streams. This miscount causes the application to apply an incorrect infinite timeout, allowing connections to persist indefinitely. Such behavior results in uncontrolled resource consumption, potentially exhausting server resources and leading to denial of service (DoS) conditions. By exploiting this flaw, an attacker could degrade the performance or availability of the server.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.src", "8Base-JWS-6.0:jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "9Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.src", "9Base-JWS-6.0:jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-34750" }, { "category": "external", "summary": "RHBZ#2295651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-34750", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34750" }, { "category": "external", "summary": "https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l", "url": "https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l" } ], "release_date": "2024-07-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-06T13:50:14+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.src", "8Base-JWS-6.0:jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "9Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.src", "9Base-JWS-6.0:jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4976" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.src", "8Base-JWS-6.0:jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "9Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.src", "9Base-JWS-6.0:jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.src", "8Base-JWS-6.0:jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "9Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.src", "9Base-JWS-6.0:jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Improper Handling of Exceptional Conditions" }, { "cve": "CVE-2024-38286", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-09-25T15:03:31.413000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314686" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Tomcat. Under certain configurations on any platform, this flaw allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Denial of Service in Tomcat", "title": "Vulnerability summary" }, { "category": "other", "text": "CVE-2024-38286 represents an important security issue due to its potential to cause an `OutOfMemoryError` through the exploitation of the TLS handshake process in Apache Tomcat. This vulnerability specifically impacts configurations using TLS 1.3, which is increasingly adopted for secure communications. The ability for an attacker to trigger an OutOfMemoryError can lead to a denial-of-service (DoS) condition, effectively rendering the application or server inoperable.\n\nThe issue only affects configurations that utilize TLS 1.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.src", "8Base-JWS-6.0:jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "9Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.src", "9Base-JWS-6.0:jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38286" }, { "category": "external", "summary": "RHBZ#2314686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38286", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38286" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38286", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38286" }, { "category": "external", "summary": "https://lists.apache.org/thread/wms60cvbsz3fpbz9psxtfx8r41jl6d4s", "url": "https://lists.apache.org/thread/wms60cvbsz3fpbz9psxtfx8r41jl6d4s" } ], "release_date": "2024-09-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-06T13:50:14+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.src", "8Base-JWS-6.0:jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "9Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.src", "9Base-JWS-6.0:jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4976" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.src", "8Base-JWS-6.0:jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "9Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.src", "9Base-JWS-6.0:jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws.src", "8Base-JWS-6.0:jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "8Base-JWS-6.0:jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el8jws.noarch", "9Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws.src", "9Base-JWS-6.0:jws6-tomcat-admin-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-docs-webapp-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-el-5.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-javadoc-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-jsp-3.1-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-lib-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-selinux-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-servlet-6.0-api-0:10.1.8-10.redhat_00018.1.el9jws.noarch", "9Base-JWS-6.0:jws6-tomcat-webapps-0:10.1.8-10.redhat_00018.1.el9jws.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Denial of Service in Tomcat" } ] }
rhsa-2024_5024
Vulnerability from csaf_redhat
Published
2024-08-06 13:51
Modified
2024-10-30 08:27
Summary
Red Hat Security Advisory: Red Hat JBoss Web Server 5.8.1 release and security update
Notes
Topic
An update is now available for Red Hat JBoss Web Server 5.8 on Red Hat Enterprise Linux versions 7, 8, and 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.
This release of Red Hat JBoss Web Server 5.8.1 serves as a replacement for Red Hat JBoss Web Server 5.8.0. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes that are linked to in the References section.
Security Fix(es):
* jws5-tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750)
* jws5-tomcat: Denial of Service in Tomcat (CVE-2024-38286)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Web Server 5.8 on Red Hat Enterprise Linux versions 7, 8, and 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 5.8.1 serves as a replacement for Red Hat JBoss Web Server 5.8.0. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes that are linked to in the References section.\n\nSecurity Fix(es):\n\n* jws5-tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750)\n* jws5-tomcat: Denial of Service in Tomcat (CVE-2024-38286)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5024", "url": "https://access.redhat.com/errata/RHSA-2024:5024" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/5.8/html-single/red_hat_jboss_web_server_5.8_service_pack_1_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/5.8/html-single/red_hat_jboss_web_server_5.8_service_pack_1_release_notes/index" }, { "category": "external", "summary": "2295651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295651" }, { "category": "external", "summary": "2314686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314686" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5024.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 5.8.1 release and security update", "tracking": { "current_release_date": "2024-10-30T08:27:16+00:00", "generator": { "date": "2024-10-30T08:27:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.0" } }, "id": "RHSA-2024:5024", "initial_release_date": "2024-08-06T13:51:19+00:00", "revision_history": [ { "date": "2024-08-06T13:51:19+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-01T13:29:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-10-30T08:27:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product": { "name": "Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.8::el7" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Server 5.8 for RHEL 8", "product": { "name": "Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.8::el8" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Server 5.8 for RHEL 9", "product": { "name": "Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.8::el9" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" }, { "branches": [ { "category": "product_version", "name": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.src", "product": { "name": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.src", "product_id": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.87-5.redhat_00005.1.el7jws?arch=src" } } }, { "category": "product_version", "name": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.src", "product": { "name": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.src", "product_id": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.87-5.redhat_00005.1.el8jws?arch=src" } } }, { "category": "product_version", "name": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.src", "product": { "name": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.src", "product_id": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.87-5.redhat_00005.1.el9jws?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product": { "name": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_id": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.87-5.redhat_00005.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product": { "name": "jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_id": "jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-admin-webapps@9.0.87-5.redhat_00005.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product": { "name": "jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_id": "jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-docs-webapp@9.0.87-5.redhat_00005.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product": { "name": "jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_id": "jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-el-3.0-api@9.0.87-5.redhat_00005.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-java-jdk11-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product": { "name": "jws5-tomcat-java-jdk11-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_id": "jws5-tomcat-java-jdk11-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-java-jdk11@9.0.87-5.redhat_00005.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-java-jdk8-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product": { "name": "jws5-tomcat-java-jdk8-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_id": "jws5-tomcat-java-jdk8-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-java-jdk8@9.0.87-5.redhat_00005.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product": { "name": "jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_id": "jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-javadoc@9.0.87-5.redhat_00005.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_id": "jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-jsp-2.3-api@9.0.87-5.redhat_00005.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product": { "name": "jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_id": "jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-lib@9.0.87-5.redhat_00005.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product": { "name": "jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_id": "jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-selinux@9.0.87-5.redhat_00005.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_id": "jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-servlet-4.0-api@9.0.87-5.redhat_00005.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product": { "name": "jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_id": "jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-webapps@9.0.87-5.redhat_00005.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product": { "name": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product_id": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.87-5.redhat_00005.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product": { "name": "jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product_id": "jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-admin-webapps@9.0.87-5.redhat_00005.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product": { "name": "jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product_id": "jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-docs-webapp@9.0.87-5.redhat_00005.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product": { "name": "jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product_id": "jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-el-3.0-api@9.0.87-5.redhat_00005.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product": { "name": "jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product_id": "jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-javadoc@9.0.87-5.redhat_00005.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product_id": "jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-jsp-2.3-api@9.0.87-5.redhat_00005.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product": { "name": "jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product_id": "jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-lib@9.0.87-5.redhat_00005.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product": { "name": "jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product_id": "jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-selinux@9.0.87-5.redhat_00005.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product_id": "jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-servlet-4.0-api@9.0.87-5.redhat_00005.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product": { "name": "jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product_id": "jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-webapps@9.0.87-5.redhat_00005.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product": { "name": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product_id": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.87-5.redhat_00005.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product": { "name": "jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product_id": "jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-admin-webapps@9.0.87-5.redhat_00005.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product": { "name": "jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product_id": "jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-docs-webapp@9.0.87-5.redhat_00005.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product": { "name": "jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product_id": "jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-el-3.0-api@9.0.87-5.redhat_00005.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product": { "name": "jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product_id": "jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-javadoc@9.0.87-5.redhat_00005.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product_id": "jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-jsp-2.3-api@9.0.87-5.redhat_00005.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product": { "name": "jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product_id": "jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-lib@9.0.87-5.redhat_00005.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product": { "name": "jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product_id": "jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-selinux@9.0.87-5.redhat_00005.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product_id": "jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-servlet-4.0-api@9.0.87-5.redhat_00005.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product": { "name": "jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product_id": "jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-webapps@9.0.87-5.redhat_00005.1.el9jws?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.src as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.src" }, "product_reference": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.src", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-java-jdk11-0:9.0.87-5.redhat_00005.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-5.redhat_00005.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-java-jdk11-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-java-jdk8-0:9.0.87-5.redhat_00005.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-5.redhat_00005.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-java-jdk8-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.src as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.src" }, "product_reference": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.src", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.src as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.src" }, "product_reference": "jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.src", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-34750", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "discovery_date": "2024-07-03T20:41:10+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295651" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This issue led to a miscounting of active HTTP/2 streams, which in turn led to using an incorrect infinite timeout that allowed connections to remain open that should have been closed.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Improper Handling of Exceptional Conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability in Apache Tomcat is significant due to its impact on the stability and security of web applications relying on HTTP/2. The improper handling of excessive HTTP headers during HTTP/2 stream processing leads to an inaccurate count of active streams. This miscount causes the application to apply an incorrect infinite timeout, allowing connections to persist indefinitely. Such behavior results in uncontrolled resource consumption, potentially exhausting server resources and leading to denial of service (DoS) conditions. By exploiting this flaw, an attacker could degrade the performance or availability of the server.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-34750" }, { "category": "external", "summary": "RHBZ#2295651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-34750", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34750" }, { "category": "external", "summary": "https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l", "url": "https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l" } ], "release_date": "2024-07-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-06T13:51:19+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5024" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Improper Handling of Exceptional Conditions" }, { "cve": "CVE-2024-38286", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-09-25T15:03:31.413000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314686" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Tomcat. Under certain configurations on any platform, this flaw allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Denial of Service in Tomcat", "title": "Vulnerability summary" }, { "category": "other", "text": "CVE-2024-38286 represents an important security issue due to its potential to cause an `OutOfMemoryError` through the exploitation of the TLS handshake process in Apache Tomcat. This vulnerability specifically impacts configurations using TLS 1.3, which is increasingly adopted for secure communications. The ability for an attacker to trigger an OutOfMemoryError can lead to a denial-of-service (DoS) condition, effectively rendering the application or server inoperable.\n\nThe issue only affects configurations that utilize TLS 1.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38286" }, { "category": "external", "summary": "RHBZ#2314686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38286", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38286" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38286", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38286" }, { "category": "external", "summary": "https://lists.apache.org/thread/wms60cvbsz3fpbz9psxtfx8r41jl6d4s", "url": "https://lists.apache.org/thread/wms60cvbsz3fpbz9psxtfx8r41jl6d4s" } ], "release_date": "2024-09-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-06T13:51:19+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5024" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-5.redhat_00005.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-5.redhat_00005.1.el9jws.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Denial of Service in Tomcat" } ] }
rhsa-2024_5695
Vulnerability from csaf_redhat
Published
2024-08-21 11:53
Modified
2024-11-06 06:46
Summary
Red Hat Security Advisory: tomcat security update
Notes
Topic
An update for tomcat is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
* tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750)
* tomcat: Denial of Service in Tomcat (CVE-2024-38286)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tomcat is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nSecurity Fix(es):\n\n* tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750)\n\n* tomcat: Denial of Service in Tomcat (CVE-2024-38286)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5695", "url": "https://access.redhat.com/errata/RHSA-2024:5695" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295651" }, { "category": "external", "summary": "2314686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314686" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5695.json" } ], "title": "Red Hat Security Advisory: tomcat security update", "tracking": { "current_release_date": "2024-11-06T06:46:24+00:00", "generator": { "date": "2024-11-06T06:46:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2024:5695", "initial_release_date": "2024-08-21T11:53:47+00:00", "revision_history": [ { "date": "2024-08-21T11:53:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-10T18:15:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T06:46:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el8_8.3.src", "product": { "name": "tomcat-1:9.0.87-1.el8_8.3.src", "product_id": "tomcat-1:9.0.87-1.el8_8.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el8_8.3?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el8_8.3.noarch", "product": { "name": "tomcat-1:9.0.87-1.el8_8.3.noarch", "product_id": "tomcat-1:9.0.87-1.el8_8.3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el8_8.3?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-admin-webapps-1:9.0.87-1.el8_8.3.noarch", "product": { "name": "tomcat-admin-webapps-1:9.0.87-1.el8_8.3.noarch", "product_id": "tomcat-admin-webapps-1:9.0.87-1.el8_8.3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-admin-webapps@9.0.87-1.el8_8.3?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-docs-webapp-1:9.0.87-1.el8_8.3.noarch", "product": { "name": "tomcat-docs-webapp-1:9.0.87-1.el8_8.3.noarch", "product_id": "tomcat-docs-webapp-1:9.0.87-1.el8_8.3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-docs-webapp@9.0.87-1.el8_8.3?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-el-3.0-api-1:9.0.87-1.el8_8.3.noarch", "product": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el8_8.3.noarch", "product_id": "tomcat-el-3.0-api-1:9.0.87-1.el8_8.3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-el-3.0-api@9.0.87-1.el8_8.3?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.3.noarch", "product": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.3.noarch", "product_id": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jsp-2.3-api@9.0.87-1.el8_8.3?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-lib-1:9.0.87-1.el8_8.3.noarch", "product": { "name": "tomcat-lib-1:9.0.87-1.el8_8.3.noarch", "product_id": "tomcat-lib-1:9.0.87-1.el8_8.3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-lib@9.0.87-1.el8_8.3?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.3.noarch", "product": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.3.noarch", "product_id": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-servlet-4.0-api@9.0.87-1.el8_8.3?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-webapps-1:9.0.87-1.el8_8.3.noarch", "product": { "name": "tomcat-webapps-1:9.0.87-1.el8_8.3.noarch", "product_id": "tomcat-webapps-1:9.0.87-1.el8_8.3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-webapps@9.0.87-1.el8_8.3?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el8_8.3.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tomcat-1:9.0.87-1.el8_8.3.noarch" }, "product_reference": "tomcat-1:9.0.87-1.el8_8.3.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el8_8.3.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tomcat-1:9.0.87-1.el8_8.3.src" }, "product_reference": "tomcat-1:9.0.87-1.el8_8.3.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-1:9.0.87-1.el8_8.3.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.3.noarch" }, "product_reference": "tomcat-admin-webapps-1:9.0.87-1.el8_8.3.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-1:9.0.87-1.el8_8.3.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.3.noarch" }, "product_reference": "tomcat-docs-webapp-1:9.0.87-1.el8_8.3.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el8_8.3.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.3.noarch" }, "product_reference": "tomcat-el-3.0-api-1:9.0.87-1.el8_8.3.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.3.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.3.noarch" }, "product_reference": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.3.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-1:9.0.87-1.el8_8.3.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tomcat-lib-1:9.0.87-1.el8_8.3.noarch" }, "product_reference": "tomcat-lib-1:9.0.87-1.el8_8.3.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.3.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.3.noarch" }, "product_reference": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.3.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-1:9.0.87-1.el8_8.3.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el8_8.3.noarch" }, "product_reference": "tomcat-webapps-1:9.0.87-1.el8_8.3.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-34750", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "discovery_date": "2024-07-03T20:41:10+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295651" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This issue led to a miscounting of active HTTP/2 streams, which in turn led to using an incorrect infinite timeout that allowed connections to remain open that should have been closed.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Improper Handling of Exceptional Conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability in Apache Tomcat is significant due to its impact on the stability and security of web applications relying on HTTP/2. The improper handling of excessive HTTP headers during HTTP/2 stream processing leads to an inaccurate count of active streams. This miscount causes the application to apply an incorrect infinite timeout, allowing connections to persist indefinitely. Such behavior results in uncontrolled resource consumption, potentially exhausting server resources and leading to denial of service (DoS) conditions. By exploiting this flaw, an attacker could degrade the performance or availability of the server.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:tomcat-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-1:9.0.87-1.el8_8.3.src", "AppStream-8.8.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-lib-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el8_8.3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-34750" }, { "category": "external", "summary": "RHBZ#2295651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-34750", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34750" }, { "category": "external", "summary": "https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l", "url": "https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l" } ], "release_date": "2024-07-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-21T11:53:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:tomcat-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-1:9.0.87-1.el8_8.3.src", "AppStream-8.8.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-lib-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el8_8.3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5695" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.8.0.Z.EUS:tomcat-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-1:9.0.87-1.el8_8.3.src", "AppStream-8.8.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-lib-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el8_8.3.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:tomcat-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-1:9.0.87-1.el8_8.3.src", "AppStream-8.8.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-lib-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el8_8.3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Improper Handling of Exceptional Conditions" }, { "cve": "CVE-2024-38286", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-09-25T15:03:31.413000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314686" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Tomcat. Under certain configurations on any platform, this flaw allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Denial of Service in Tomcat", "title": "Vulnerability summary" }, { "category": "other", "text": "CVE-2024-38286 represents an important security issue due to its potential to cause an `OutOfMemoryError` through the exploitation of the TLS handshake process in Apache Tomcat. This vulnerability specifically impacts configurations using TLS 1.3, which is increasingly adopted for secure communications. The ability for an attacker to trigger an OutOfMemoryError can lead to a denial-of-service (DoS) condition, effectively rendering the application or server inoperable.\n\nThe issue only affects configurations that utilize TLS 1.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:tomcat-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-1:9.0.87-1.el8_8.3.src", "AppStream-8.8.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-lib-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el8_8.3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38286" }, { "category": "external", "summary": "RHBZ#2314686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38286", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38286" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38286", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38286" }, { "category": "external", "summary": "https://lists.apache.org/thread/wms60cvbsz3fpbz9psxtfx8r41jl6d4s", "url": "https://lists.apache.org/thread/wms60cvbsz3fpbz9psxtfx8r41jl6d4s" } ], "release_date": "2024-09-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-21T11:53:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:tomcat-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-1:9.0.87-1.el8_8.3.src", "AppStream-8.8.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-lib-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el8_8.3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5695" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.8.0.Z.EUS:tomcat-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-1:9.0.87-1.el8_8.3.src", "AppStream-8.8.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-lib-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el8_8.3.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:tomcat-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-1:9.0.87-1.el8_8.3.src", "AppStream-8.8.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-lib-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.3.noarch", "AppStream-8.8.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el8_8.3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Denial of Service in Tomcat" } ] }
rhsa-2024_5693
Vulnerability from csaf_redhat
Published
2024-08-21 11:56
Modified
2024-11-06 06:46
Summary
Red Hat Security Advisory: tomcat security update
Notes
Topic
An update for tomcat is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
* tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750)
* tomcat: Denial of Service in Tomcat (CVE-2024-38286)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tomcat is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nSecurity Fix(es):\n\n* tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750)\n\n* tomcat: Denial of Service in Tomcat (CVE-2024-38286)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5693", "url": "https://access.redhat.com/errata/RHSA-2024:5693" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295651" }, { "category": "external", "summary": "2314686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314686" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5693.json" } ], "title": "Red Hat Security Advisory: tomcat security update", "tracking": { "current_release_date": "2024-11-06T06:46:03+00:00", "generator": { "date": "2024-11-06T06:46:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2024:5693", "initial_release_date": "2024-08-21T11:56:16+00:00", "revision_history": [ { "date": "2024-08-21T11:56:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-09T18:20:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T06:46:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el9_4.2.src", "product": { "name": "tomcat-1:9.0.87-1.el9_4.2.src", "product_id": "tomcat-1:9.0.87-1.el9_4.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el9_4.2?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el9_4.2.noarch", "product": { "name": "tomcat-1:9.0.87-1.el9_4.2.noarch", "product_id": "tomcat-1:9.0.87-1.el9_4.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el9_4.2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-admin-webapps-1:9.0.87-1.el9_4.2.noarch", "product": { "name": "tomcat-admin-webapps-1:9.0.87-1.el9_4.2.noarch", "product_id": "tomcat-admin-webapps-1:9.0.87-1.el9_4.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-admin-webapps@9.0.87-1.el9_4.2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-docs-webapp-1:9.0.87-1.el9_4.2.noarch", "product": { "name": "tomcat-docs-webapp-1:9.0.87-1.el9_4.2.noarch", "product_id": "tomcat-docs-webapp-1:9.0.87-1.el9_4.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-docs-webapp@9.0.87-1.el9_4.2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-el-3.0-api-1:9.0.87-1.el9_4.2.noarch", "product": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el9_4.2.noarch", "product_id": "tomcat-el-3.0-api-1:9.0.87-1.el9_4.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-el-3.0-api@9.0.87-1.el9_4.2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.2.noarch", "product": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.2.noarch", "product_id": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jsp-2.3-api@9.0.87-1.el9_4.2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-lib-1:9.0.87-1.el9_4.2.noarch", "product": { "name": "tomcat-lib-1:9.0.87-1.el9_4.2.noarch", "product_id": "tomcat-lib-1:9.0.87-1.el9_4.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-lib@9.0.87-1.el9_4.2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.2.noarch", "product": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.2.noarch", "product_id": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-servlet-4.0-api@9.0.87-1.el9_4.2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-webapps-1:9.0.87-1.el9_4.2.noarch", "product": { "name": "tomcat-webapps-1:9.0.87-1.el9_4.2.noarch", "product_id": "tomcat-webapps-1:9.0.87-1.el9_4.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-webapps@9.0.87-1.el9_4.2?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el9_4.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el9_4.2.noarch" }, "product_reference": "tomcat-1:9.0.87-1.el9_4.2.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el9_4.2.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el9_4.2.src" }, "product_reference": "tomcat-1:9.0.87-1.el9_4.2.src", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-1:9.0.87-1.el9_4.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.2.noarch" }, "product_reference": "tomcat-admin-webapps-1:9.0.87-1.el9_4.2.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-1:9.0.87-1.el9_4.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.2.noarch" }, "product_reference": "tomcat-docs-webapp-1:9.0.87-1.el9_4.2.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el9_4.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.2.noarch" }, "product_reference": "tomcat-el-3.0-api-1:9.0.87-1.el9_4.2.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.2.noarch" }, "product_reference": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.2.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-1:9.0.87-1.el9_4.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el9_4.2.noarch" }, "product_reference": "tomcat-lib-1:9.0.87-1.el9_4.2.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.2.noarch" }, "product_reference": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.2.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-1:9.0.87-1.el9_4.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el9_4.2.noarch" }, "product_reference": "tomcat-webapps-1:9.0.87-1.el9_4.2.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-34750", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "discovery_date": "2024-07-03T20:41:10+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295651" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This issue led to a miscounting of active HTTP/2 streams, which in turn led to using an incorrect infinite timeout that allowed connections to remain open that should have been closed.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Improper Handling of Exceptional Conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability in Apache Tomcat is significant due to its impact on the stability and security of web applications relying on HTTP/2. The improper handling of excessive HTTP headers during HTTP/2 stream processing leads to an inaccurate count of active streams. This miscount causes the application to apply an incorrect infinite timeout, allowing connections to persist indefinitely. Such behavior results in uncontrolled resource consumption, potentially exhausting server resources and leading to denial of service (DoS) conditions. By exploiting this flaw, an attacker could degrade the performance or availability of the server.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el9_4.2.src", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el9_4.2.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-34750" }, { "category": "external", "summary": "RHBZ#2295651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-34750", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34750" }, { "category": "external", "summary": "https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l", "url": "https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l" } ], "release_date": "2024-07-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-21T11:56:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el9_4.2.src", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el9_4.2.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5693" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el9_4.2.src", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el9_4.2.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el9_4.2.src", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el9_4.2.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Improper Handling of Exceptional Conditions" }, { "cve": "CVE-2024-38286", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-09-25T15:03:31.413000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314686" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Tomcat. Under certain configurations on any platform, this flaw allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Denial of Service in Tomcat", "title": "Vulnerability summary" }, { "category": "other", "text": "CVE-2024-38286 represents an important security issue due to its potential to cause an `OutOfMemoryError` through the exploitation of the TLS handshake process in Apache Tomcat. This vulnerability specifically impacts configurations using TLS 1.3, which is increasingly adopted for secure communications. The ability for an attacker to trigger an OutOfMemoryError can lead to a denial-of-service (DoS) condition, effectively rendering the application or server inoperable.\n\nThe issue only affects configurations that utilize TLS 1.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el9_4.2.src", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el9_4.2.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38286" }, { "category": "external", "summary": "RHBZ#2314686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38286", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38286" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38286", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38286" }, { "category": "external", "summary": "https://lists.apache.org/thread/wms60cvbsz3fpbz9psxtfx8r41jl6d4s", "url": "https://lists.apache.org/thread/wms60cvbsz3fpbz9psxtfx8r41jl6d4s" } ], "release_date": "2024-09-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-21T11:56:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el9_4.2.src", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el9_4.2.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5693" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el9_4.2.src", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el9_4.2.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el9_4.2.src", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.2.noarch", "AppStream-9.4.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el9_4.2.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Denial of Service in Tomcat" } ] }
rhsa-2024_5694
Vulnerability from csaf_redhat
Published
2024-08-21 11:53
Modified
2024-11-06 06:46
Summary
Red Hat Security Advisory: tomcat security update
Notes
Topic
An update for tomcat is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
* tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750)
* tomcat: Denial of Service in Tomcat (CVE-2024-38286)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tomcat is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nSecurity Fix(es):\n\n* tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750)\n\n* tomcat: Denial of Service in Tomcat (CVE-2024-38286)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5694", "url": "https://access.redhat.com/errata/RHSA-2024:5694" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295651" }, { "category": "external", "summary": "2314686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314686" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5694.json" } ], "title": "Red Hat Security Advisory: tomcat security update", "tracking": { "current_release_date": "2024-11-06T06:46:14+00:00", "generator": { "date": "2024-11-06T06:46:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2024:5694", "initial_release_date": "2024-08-21T11:53:16+00:00", "revision_history": [ { "date": "2024-08-21T11:53:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-09T18:25:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T06:46:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el8_10.2.src", "product": { "name": "tomcat-1:9.0.87-1.el8_10.2.src", "product_id": "tomcat-1:9.0.87-1.el8_10.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el8_10.2?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el8_10.2.noarch", "product": { "name": "tomcat-1:9.0.87-1.el8_10.2.noarch", "product_id": "tomcat-1:9.0.87-1.el8_10.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el8_10.2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-admin-webapps-1:9.0.87-1.el8_10.2.noarch", "product": { "name": "tomcat-admin-webapps-1:9.0.87-1.el8_10.2.noarch", "product_id": "tomcat-admin-webapps-1:9.0.87-1.el8_10.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-admin-webapps@9.0.87-1.el8_10.2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-docs-webapp-1:9.0.87-1.el8_10.2.noarch", "product": { "name": "tomcat-docs-webapp-1:9.0.87-1.el8_10.2.noarch", "product_id": "tomcat-docs-webapp-1:9.0.87-1.el8_10.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-docs-webapp@9.0.87-1.el8_10.2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-el-3.0-api-1:9.0.87-1.el8_10.2.noarch", "product": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el8_10.2.noarch", "product_id": "tomcat-el-3.0-api-1:9.0.87-1.el8_10.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-el-3.0-api@9.0.87-1.el8_10.2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.2.noarch", "product": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.2.noarch", "product_id": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jsp-2.3-api@9.0.87-1.el8_10.2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-lib-1:9.0.87-1.el8_10.2.noarch", "product": { "name": "tomcat-lib-1:9.0.87-1.el8_10.2.noarch", "product_id": "tomcat-lib-1:9.0.87-1.el8_10.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-lib@9.0.87-1.el8_10.2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.2.noarch", "product": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.2.noarch", "product_id": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-servlet-4.0-api@9.0.87-1.el8_10.2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-webapps-1:9.0.87-1.el8_10.2.noarch", "product": { "name": "tomcat-webapps-1:9.0.87-1.el8_10.2.noarch", "product_id": "tomcat-webapps-1:9.0.87-1.el8_10.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-webapps@9.0.87-1.el8_10.2?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el8_10.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.2.noarch" }, "product_reference": "tomcat-1:9.0.87-1.el8_10.2.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el8_10.2.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.2.src" }, "product_reference": "tomcat-1:9.0.87-1.el8_10.2.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-1:9.0.87-1.el8_10.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.2.noarch" }, "product_reference": "tomcat-admin-webapps-1:9.0.87-1.el8_10.2.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-1:9.0.87-1.el8_10.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.2.noarch" }, "product_reference": "tomcat-docs-webapp-1:9.0.87-1.el8_10.2.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el8_10.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.2.noarch" }, "product_reference": "tomcat-el-3.0-api-1:9.0.87-1.el8_10.2.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.2.noarch" }, "product_reference": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.2.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-1:9.0.87-1.el8_10.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.2.noarch" }, "product_reference": "tomcat-lib-1:9.0.87-1.el8_10.2.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.2.noarch" }, "product_reference": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.2.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-1:9.0.87-1.el8_10.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.2.noarch" }, "product_reference": "tomcat-webapps-1:9.0.87-1.el8_10.2.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-34750", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "discovery_date": "2024-07-03T20:41:10+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295651" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This issue led to a miscounting of active HTTP/2 streams, which in turn led to using an incorrect infinite timeout that allowed connections to remain open that should have been closed.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Improper Handling of Exceptional Conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability in Apache Tomcat is significant due to its impact on the stability and security of web applications relying on HTTP/2. The improper handling of excessive HTTP headers during HTTP/2 stream processing leads to an inaccurate count of active streams. This miscount causes the application to apply an incorrect infinite timeout, allowing connections to persist indefinitely. Such behavior results in uncontrolled resource consumption, potentially exhausting server resources and leading to denial of service (DoS) conditions. By exploiting this flaw, an attacker could degrade the performance or availability of the server.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.2.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.2.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-34750" }, { "category": "external", "summary": "RHBZ#2295651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-34750", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34750" }, { "category": "external", "summary": "https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l", "url": "https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l" } ], "release_date": "2024-07-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-21T11:53:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.2.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.2.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5694" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.2.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.2.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.2.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.2.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Improper Handling of Exceptional Conditions" }, { "cve": "CVE-2024-38286", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-09-25T15:03:31.413000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314686" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Tomcat. Under certain configurations on any platform, this flaw allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Denial of Service in Tomcat", "title": "Vulnerability summary" }, { "category": "other", "text": "CVE-2024-38286 represents an important security issue due to its potential to cause an `OutOfMemoryError` through the exploitation of the TLS handshake process in Apache Tomcat. This vulnerability specifically impacts configurations using TLS 1.3, which is increasingly adopted for secure communications. The ability for an attacker to trigger an OutOfMemoryError can lead to a denial-of-service (DoS) condition, effectively rendering the application or server inoperable.\n\nThe issue only affects configurations that utilize TLS 1.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.2.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.2.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38286" }, { "category": "external", "summary": "RHBZ#2314686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38286", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38286" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38286", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38286" }, { "category": "external", "summary": "https://lists.apache.org/thread/wms60cvbsz3fpbz9psxtfx8r41jl6d4s", "url": "https://lists.apache.org/thread/wms60cvbsz3fpbz9psxtfx8r41jl6d4s" } ], "release_date": "2024-09-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-21T11:53:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.2.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.2.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5694" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.2.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.2.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.2.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.2.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.2.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Denial of Service in Tomcat" } ] }
rhsa-2024_4977
Vulnerability from csaf_redhat
Published
2024-08-06 11:07
Modified
2024-10-30 08:26
Summary
Red Hat Security Advisory: Red Hat JBoss Web Server 6.0.3 release and security update
Notes
Topic
Red Hat JBoss Web Server 6.0.3 zip release is now available for Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9, and Windows Server.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.
This release of Red Hat JBoss Web Server 6.0.3 serves as a replacement for Red Hat JBoss Web Server 6.0.2. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes that are linked to in the References section.
Security Fix(es):
* jws6-tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750)
* jws6-tomcat: Denial of Service in Tomcat (CVE-2024-38286)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Web Server 6.0.3 zip release is now available for Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9, and Windows Server.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 6.0.3 serves as a replacement for Red Hat JBoss Web Server 6.0.2. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes that are linked to in the References section.\n\nSecurity Fix(es):\n\n* jws6-tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750)\n* jws6-tomcat: Denial of Service in Tomcat (CVE-2024-38286)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4977", "url": "https://access.redhat.com/errata/RHSA-2024:4977" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/6.0/html-single/red_hat_jboss_web_server_6.0_service_pack_3_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/6.0/html-single/red_hat_jboss_web_server_6.0_service_pack_3_release_notes/index" }, { "category": "external", "summary": "2295651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295651" }, { "category": "external", "summary": "2314686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314686" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4977.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 6.0.3 release and security update", "tracking": { "current_release_date": "2024-10-30T08:26:54+00:00", "generator": { "date": "2024-10-30T08:26:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.0" } }, "id": "RHSA-2024:4977", "initial_release_date": "2024-08-06T11:07:16+00:00", "revision_history": [ { "date": "2024-08-06T11:07:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-01T11:35:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-10-30T08:26:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 6", "product": { "name": "Red Hat JBoss Web Server 6", "product_id": "Red Hat JBoss Web Server 6", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:6.0" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-34750", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "discovery_date": "2024-07-03T20:41:10+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295651" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This issue led to a miscounting of active HTTP/2 streams, which in turn led to using an incorrect infinite timeout that allowed connections to remain open that should have been closed.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Improper Handling of Exceptional Conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability in Apache Tomcat is significant due to its impact on the stability and security of web applications relying on HTTP/2. The improper handling of excessive HTTP headers during HTTP/2 stream processing leads to an inaccurate count of active streams. This miscount causes the application to apply an incorrect infinite timeout, allowing connections to persist indefinitely. Such behavior results in uncontrolled resource consumption, potentially exhausting server resources and leading to denial of service (DoS) conditions. By exploiting this flaw, an attacker could degrade the performance or availability of the server.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 6" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-34750" }, { "category": "external", "summary": "RHBZ#2295651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-34750", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34750" }, { "category": "external", "summary": "https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l", "url": "https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l" } ], "release_date": "2024-07-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-06T11:07:16+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation, including all applications and configuration files.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Web Server 6" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4977" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat JBoss Web Server 6" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Web Server 6" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Improper Handling of Exceptional Conditions" }, { "cve": "CVE-2024-38286", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-09-25T15:03:31.413000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314686" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Tomcat. Under certain configurations on any platform, this flaw allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Denial of Service in Tomcat", "title": "Vulnerability summary" }, { "category": "other", "text": "CVE-2024-38286 represents an important security issue due to its potential to cause an `OutOfMemoryError` through the exploitation of the TLS handshake process in Apache Tomcat. This vulnerability specifically impacts configurations using TLS 1.3, which is increasingly adopted for secure communications. The ability for an attacker to trigger an OutOfMemoryError can lead to a denial-of-service (DoS) condition, effectively rendering the application or server inoperable.\n\nThe issue only affects configurations that utilize TLS 1.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 6" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38286" }, { "category": "external", "summary": "RHBZ#2314686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38286", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38286" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38286", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38286" }, { "category": "external", "summary": "https://lists.apache.org/thread/wms60cvbsz3fpbz9psxtfx8r41jl6d4s", "url": "https://lists.apache.org/thread/wms60cvbsz3fpbz9psxtfx8r41jl6d4s" } ], "release_date": "2024-09-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-06T11:07:16+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation, including all applications and configuration files.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Web Server 6" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4977" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat JBoss Web Server 6" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Web Server 6" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Denial of Service in Tomcat" } ] }
rhsa-2024_5696
Vulnerability from csaf_redhat
Published
2024-08-21 11:56
Modified
2024-11-06 06:46
Summary
Red Hat Security Advisory: tomcat security update
Notes
Topic
An update for tomcat is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
* tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750)
* tomcat: Denial of Service in Tomcat (CVE-2024-38286)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tomcat is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nSecurity Fix(es):\n\n* tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750)\n\n* tomcat: Denial of Service in Tomcat (CVE-2024-38286)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5696", "url": "https://access.redhat.com/errata/RHSA-2024:5696" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295651" }, { "category": "external", "summary": "2314686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314686" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5696.json" } ], "title": "Red Hat Security Advisory: tomcat security update", "tracking": { "current_release_date": "2024-11-06T06:46:15+00:00", "generator": { "date": "2024-11-06T06:46:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2024:5696", "initial_release_date": "2024-08-21T11:56:41+00:00", "revision_history": [ { "date": "2024-08-21T11:56:41+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-09T18:17:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T06:46:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el9_2.2.src", "product": { "name": "tomcat-1:9.0.87-1.el9_2.2.src", "product_id": "tomcat-1:9.0.87-1.el9_2.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el9_2.2?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el9_2.2.noarch", "product": { "name": "tomcat-1:9.0.87-1.el9_2.2.noarch", "product_id": "tomcat-1:9.0.87-1.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el9_2.2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-admin-webapps-1:9.0.87-1.el9_2.2.noarch", "product": { "name": "tomcat-admin-webapps-1:9.0.87-1.el9_2.2.noarch", "product_id": "tomcat-admin-webapps-1:9.0.87-1.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-admin-webapps@9.0.87-1.el9_2.2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-docs-webapp-1:9.0.87-1.el9_2.2.noarch", "product": { "name": "tomcat-docs-webapp-1:9.0.87-1.el9_2.2.noarch", "product_id": "tomcat-docs-webapp-1:9.0.87-1.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-docs-webapp@9.0.87-1.el9_2.2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-el-3.0-api-1:9.0.87-1.el9_2.2.noarch", "product": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el9_2.2.noarch", "product_id": "tomcat-el-3.0-api-1:9.0.87-1.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-el-3.0-api@9.0.87-1.el9_2.2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.2.noarch", "product": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.2.noarch", "product_id": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jsp-2.3-api@9.0.87-1.el9_2.2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-lib-1:9.0.87-1.el9_2.2.noarch", "product": { "name": "tomcat-lib-1:9.0.87-1.el9_2.2.noarch", "product_id": "tomcat-lib-1:9.0.87-1.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-lib@9.0.87-1.el9_2.2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.2.noarch", "product": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.2.noarch", "product_id": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-servlet-4.0-api@9.0.87-1.el9_2.2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-webapps-1:9.0.87-1.el9_2.2.noarch", "product": { "name": "tomcat-webapps-1:9.0.87-1.el9_2.2.noarch", "product_id": "tomcat-webapps-1:9.0.87-1.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-webapps@9.0.87-1.el9_2.2?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tomcat-1:9.0.87-1.el9_2.2.noarch" }, "product_reference": "tomcat-1:9.0.87-1.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el9_2.2.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tomcat-1:9.0.87-1.el9_2.2.src" }, "product_reference": "tomcat-1:9.0.87-1.el9_2.2.src", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-1:9.0.87-1.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_2.2.noarch" }, "product_reference": "tomcat-admin-webapps-1:9.0.87-1.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-1:9.0.87-1.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_2.2.noarch" }, "product_reference": "tomcat-docs-webapp-1:9.0.87-1.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_2.2.noarch" }, "product_reference": "tomcat-el-3.0-api-1:9.0.87-1.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.2.noarch" }, "product_reference": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-1:9.0.87-1.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_2.2.noarch" }, "product_reference": "tomcat-lib-1:9.0.87-1.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.2.noarch" }, "product_reference": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-1:9.0.87-1.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_2.2.noarch" }, "product_reference": "tomcat-webapps-1:9.0.87-1.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-34750", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "discovery_date": "2024-07-03T20:41:10+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295651" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This issue led to a miscounting of active HTTP/2 streams, which in turn led to using an incorrect infinite timeout that allowed connections to remain open that should have been closed.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Improper Handling of Exceptional Conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability in Apache Tomcat is significant due to its impact on the stability and security of web applications relying on HTTP/2. The improper handling of excessive HTTP headers during HTTP/2 stream processing leads to an inaccurate count of active streams. This miscount causes the application to apply an incorrect infinite timeout, allowing connections to persist indefinitely. Such behavior results in uncontrolled resource consumption, potentially exhausting server resources and leading to denial of service (DoS) conditions. By exploiting this flaw, an attacker could degrade the performance or availability of the server.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:tomcat-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-1:9.0.87-1.el9_2.2.src", "AppStream-9.2.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_2.2.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-34750" }, { "category": "external", "summary": "RHBZ#2295651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-34750", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34750" }, { "category": "external", "summary": "https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l", "url": "https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l" } ], "release_date": "2024-07-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-21T11:56:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:tomcat-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-1:9.0.87-1.el9_2.2.src", "AppStream-9.2.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_2.2.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5696" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.2.0.Z.EUS:tomcat-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-1:9.0.87-1.el9_2.2.src", "AppStream-9.2.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_2.2.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:tomcat-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-1:9.0.87-1.el9_2.2.src", "AppStream-9.2.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_2.2.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Improper Handling of Exceptional Conditions" }, { "cve": "CVE-2024-38286", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-09-25T15:03:31.413000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314686" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Tomcat. Under certain configurations on any platform, this flaw allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Denial of Service in Tomcat", "title": "Vulnerability summary" }, { "category": "other", "text": "CVE-2024-38286 represents an important security issue due to its potential to cause an `OutOfMemoryError` through the exploitation of the TLS handshake process in Apache Tomcat. This vulnerability specifically impacts configurations using TLS 1.3, which is increasingly adopted for secure communications. The ability for an attacker to trigger an OutOfMemoryError can lead to a denial-of-service (DoS) condition, effectively rendering the application or server inoperable.\n\nThe issue only affects configurations that utilize TLS 1.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:tomcat-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-1:9.0.87-1.el9_2.2.src", "AppStream-9.2.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_2.2.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38286" }, { "category": "external", "summary": "RHBZ#2314686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38286", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38286" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38286", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38286" }, { "category": "external", "summary": "https://lists.apache.org/thread/wms60cvbsz3fpbz9psxtfx8r41jl6d4s", "url": "https://lists.apache.org/thread/wms60cvbsz3fpbz9psxtfx8r41jl6d4s" } ], "release_date": "2024-09-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-21T11:56:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:tomcat-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-1:9.0.87-1.el9_2.2.src", "AppStream-9.2.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_2.2.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5696" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.2.0.Z.EUS:tomcat-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-1:9.0.87-1.el9_2.2.src", "AppStream-9.2.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_2.2.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:tomcat-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-1:9.0.87-1.el9_2.2.src", "AppStream-9.2.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_2.2.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Denial of Service in Tomcat" } ] }
rhsa-2024_5025
Vulnerability from csaf_redhat
Published
2024-08-06 10:49
Modified
2024-10-30 08:27
Summary
Red Hat Security Advisory: Red Hat JBoss Web Server 5.8.1 release and security update
Notes
Topic
Red Hat JBoss Web Server 5.8.1 zip release is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9, and Windows Server.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.
This release of Red Hat JBoss Web Server 5.8.1 serves as a replacement for Red Hat JBoss Web Server 5.8.0. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes that are linked to in the References section.
Security Fix(es):
* jws5-tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750)
* jws5-tomcat: Denial of Service in Tomcat (CVE-2024-38286)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Web Server 5.8.1 zip release is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9, and Windows Server.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 5.8.1 serves as a replacement for Red Hat JBoss Web Server 5.8.0. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes that are linked to in the References section.\n\nSecurity Fix(es):\n\n* jws5-tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750)\n* jws5-tomcat: Denial of Service in Tomcat (CVE-2024-38286)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5025", "url": "https://access.redhat.com/errata/RHSA-2024:5025" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/5.8/html-single/red_hat_jboss_web_server_5.8_service_pack_1_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/5.8/html-single/red_hat_jboss_web_server_5.8_service_pack_1_release_notes/index" }, { "category": "external", "summary": "2295651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295651" }, { "category": "external", "summary": "2314686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314686" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5025.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 5.8.1 release and security update", "tracking": { "current_release_date": "2024-10-30T08:27:28+00:00", "generator": { "date": "2024-10-30T08:27:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.0" } }, "id": "RHSA-2024:5025", "initial_release_date": "2024-08-06T10:49:14+00:00", "revision_history": [ { "date": "2024-08-06T10:49:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-01T13:29:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-10-30T08:27:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 5", "product": { "name": "Red Hat JBoss Web Server 5", "product_id": "Red Hat JBoss Web Server 5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.8" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-34750", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "discovery_date": "2024-07-03T20:41:10+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295651" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This issue led to a miscounting of active HTTP/2 streams, which in turn led to using an incorrect infinite timeout that allowed connections to remain open that should have been closed.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Improper Handling of Exceptional Conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability in Apache Tomcat is significant due to its impact on the stability and security of web applications relying on HTTP/2. The improper handling of excessive HTTP headers during HTTP/2 stream processing leads to an inaccurate count of active streams. This miscount causes the application to apply an incorrect infinite timeout, allowing connections to persist indefinitely. Such behavior results in uncontrolled resource consumption, potentially exhausting server resources and leading to denial of service (DoS) conditions. By exploiting this flaw, an attacker could degrade the performance or availability of the server.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 5" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-34750" }, { "category": "external", "summary": "RHBZ#2295651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-34750", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34750" }, { "category": "external", "summary": "https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l", "url": "https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l" } ], "release_date": "2024-07-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-06T10:49:14+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation, including all applications and configuration files.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Web Server 5" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5025" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat JBoss Web Server 5" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Web Server 5" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Improper Handling of Exceptional Conditions" }, { "cve": "CVE-2024-38286", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-09-25T15:03:31.413000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314686" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Tomcat. Under certain configurations on any platform, this flaw allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Denial of Service in Tomcat", "title": "Vulnerability summary" }, { "category": "other", "text": "CVE-2024-38286 represents an important security issue due to its potential to cause an `OutOfMemoryError` through the exploitation of the TLS handshake process in Apache Tomcat. This vulnerability specifically impacts configurations using TLS 1.3, which is increasingly adopted for secure communications. The ability for an attacker to trigger an OutOfMemoryError can lead to a denial-of-service (DoS) condition, effectively rendering the application or server inoperable.\n\nThe issue only affects configurations that utilize TLS 1.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 5" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38286" }, { "category": "external", "summary": "RHBZ#2314686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38286", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38286" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38286", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38286" }, { "category": "external", "summary": "https://lists.apache.org/thread/wms60cvbsz3fpbz9psxtfx8r41jl6d4s", "url": "https://lists.apache.org/thread/wms60cvbsz3fpbz9psxtfx8r41jl6d4s" } ], "release_date": "2024-09-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-06T10:49:14+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation, including all applications and configuration files.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Web Server 5" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5025" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat JBoss Web Server 5" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Web Server 5" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Denial of Service in Tomcat" } ] }
wid-sec-w-2024-2100
Vulnerability from csaf_certbund
Published
2024-09-10 22:00
Modified
2024-09-10 22:00
Summary
IBM Power Hardware Management Console: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die Hardware Management Console (HMC) von IBM ist ein System zur Virtualisierung von IBM Servern.
Angriff
Ein Angreifer kann mehrere Schwachstellen in IBM Power Hardware Management Console ausnutzen, um beliebigen Programmcode auszuführen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen preiszugeben.
Betroffene Betriebssysteme
- Sonstiges
- UNIX
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Hardware Management Console (HMC) von IBM ist ein System zur Virtualisierung von IBM Servern.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in IBM Power Hardware Management Console ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen preiszugeben.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-2100 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2100.json" }, { "category": "self", "summary": "WID-SEC-2024-2100 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2100" }, { "category": "external", "summary": "IBM Security Bulletin 7168007 vom 2024-09-10", "url": "https://www.ibm.com/support/pages/node/7168007" }, { "category": "external", "summary": "IBM Security Bulletin 7168008 vom 2024-09-10", "url": "https://www.ibm.com/support/pages/node/7168008" }, { "category": "external", "summary": "IBM Security Bulletin 7168013 vom 2024-09-10", "url": "https://www.ibm.com/support/pages/node/7168013" }, { "category": "external", "summary": "IBM Security Bulletin 7168015 vom 2024-09-10", "url": "https://www.ibm.com/support/pages/node/7168015" }, { "category": "external", "summary": "IBM Security Bulletin 7168014 vom 2024-09-10", "url": "https://www.ibm.com/support/pages/node/7168014" }, { "category": "external", "summary": "IBM Security Bulletin 7168016 vom 2024-09-10", "url": "https://www.ibm.com/support/pages/node/7168016" }, { "category": "external", "summary": "IBM Security Bulletin 7168017 vom 2024-09-10", "url": "https://www.ibm.com/support/pages/node/7168017" }, { "category": "external", "summary": "IBM Security Bulletin 7168018 vom 2024-09-10", "url": "https://www.ibm.com/support/pages/node/7168018" }, { "category": "external", "summary": "IBM Security Bulletin 7168019 vom 2024-09-10", "url": "https://www.ibm.com/support/pages/node/7168019" }, { "category": "external", "summary": "IBM Security Bulletin 7168020 vom 2024-09-10", "url": "https://www.ibm.com/support/pages/node/7168020" } ], "source_lang": "en-US", "title": "IBM Power Hardware Management Console: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-09-10T22:00:00.000+00:00", "generator": { "date": "2024-09-11T08:15:41.154+00:00", "engine": { "name": "BSI-WID", "version": "1.3.6" } }, "id": "WID-SEC-W-2024-2100", "initial_release_date": "2024-09-10T22:00:00.000+00:00", "revision_history": [ { "date": "2024-09-10T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV10.2.1040.0 SP2 x86", "product": { "name": "IBM Power Hardware Management Console \u003cV10.2.1040.0 SP2 x86", "product_id": "T037441" } }, { "category": "product_version", "name": "V10.2.1040.0 SP2 x86", "product": { "name": "IBM Power Hardware Management Console V10.2.1040.0 SP2 x86", "product_id": "T037441-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:hardware_management_console:v10.2.1040.0_sp2_x86" } } }, { "category": "product_version_range", "name": "\u003cV10.2.1040.0 SP2 ppc", "product": { "name": "IBM Power Hardware Management Console \u003cV10.2.1040.0 SP2 ppc", "product_id": "T037443" } }, { "category": "product_version", "name": "V10.2.1040.0 SP2 ppc", "product": { "name": "IBM Power Hardware Management Console V10.2.1040.0 SP2 ppc", "product_id": "T037443-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:hardware_management_console:v10.2.1040.0_sp2_ppc" } } }, { "category": "product_version_range", "name": "\u003cV10.3.1060.0 x86", "product": { "name": "IBM Power Hardware Management Console \u003cV10.3.1060.0 x86", "product_id": "T037444" } }, { "category": "product_version", "name": "V10.3.1060.0 x86", "product": { "name": "IBM Power Hardware Management Console V10.3.1060.0 x86", "product_id": "T037444-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:hardware_management_console:v10.3.1060.0_x86" } } }, { "category": "product_version_range", "name": "\u003cV10.3.1060.0 ppc", "product": { "name": "IBM Power Hardware Management Console \u003cV10.3.1060.0 ppc", "product_id": "T037445" } }, { "category": "product_version", "name": "V10.3.1060.0 ppc", "product": { "name": "IBM Power Hardware Management Console V10.3.1060.0 ppc", "product_id": "T037445-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:hardware_management_console:v10.3.1060.0_ppc" } } } ], "category": "product_name", "name": "Power Hardware Management Console" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "notes": [ { "category": "description", "text": "In IBM Power Hardware Management Console existieren mehrere Schwachstellen. Diese Schwachstellen betreffen die rhboot-Shim-Komponente und werden durch Fehler wie NULL-Zeiger-Dereferenzierung, Out-of-Bounds-Schreib- und Lesevorg\u00e4nge und Integer-\u00dcberl\u00e4ufe verursacht. Ein lokaler Angreifer oder ein Angreifer aus einem benachbarten Netzwerk kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen preiszugeben." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-40546" }, { "cve": "CVE-2023-40547", "notes": [ { "category": "description", "text": "In IBM Power Hardware Management Console existieren mehrere Schwachstellen. Diese Schwachstellen betreffen die rhboot-Shim-Komponente und werden durch Fehler wie NULL-Zeiger-Dereferenzierung, Out-of-Bounds-Schreib- und Lesevorg\u00e4nge und Integer-\u00dcberl\u00e4ufe verursacht. Ein lokaler Angreifer oder ein Angreifer aus einem benachbarten Netzwerk kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen preiszugeben." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-40547" }, { "cve": "CVE-2023-40548", "notes": [ { "category": "description", "text": "In IBM Power Hardware Management Console existieren mehrere Schwachstellen. Diese Schwachstellen betreffen die rhboot-Shim-Komponente und werden durch Fehler wie NULL-Zeiger-Dereferenzierung, Out-of-Bounds-Schreib- und Lesevorg\u00e4nge und Integer-\u00dcberl\u00e4ufe verursacht. Ein lokaler Angreifer oder ein Angreifer aus einem benachbarten Netzwerk kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen preiszugeben." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-40548" }, { "cve": "CVE-2023-40549", "notes": [ { "category": "description", "text": "In IBM Power Hardware Management Console existieren mehrere Schwachstellen. Diese Schwachstellen betreffen die rhboot-Shim-Komponente und werden durch Fehler wie NULL-Zeiger-Dereferenzierung, Out-of-Bounds-Schreib- und Lesevorg\u00e4nge und Integer-\u00dcberl\u00e4ufe verursacht. Ein lokaler Angreifer oder ein Angreifer aus einem benachbarten Netzwerk kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen preiszugeben." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-40549" }, { "cve": "CVE-2023-40550", "notes": [ { "category": "description", "text": "In IBM Power Hardware Management Console existieren mehrere Schwachstellen. Diese Schwachstellen betreffen die rhboot-Shim-Komponente und werden durch Fehler wie NULL-Zeiger-Dereferenzierung, Out-of-Bounds-Schreib- und Lesevorg\u00e4nge und Integer-\u00dcberl\u00e4ufe verursacht. Ein lokaler Angreifer oder ein Angreifer aus einem benachbarten Netzwerk kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen preiszugeben." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-40550" }, { "cve": "CVE-2023-40551", "notes": [ { "category": "description", "text": "In IBM Power Hardware Management Console existieren mehrere Schwachstellen. Diese Schwachstellen betreffen die rhboot-Shim-Komponente und werden durch Fehler wie NULL-Zeiger-Dereferenzierung, Out-of-Bounds-Schreib- und Lesevorg\u00e4nge und Integer-\u00dcberl\u00e4ufe verursacht. Ein lokaler Angreifer oder ein Angreifer aus einem benachbarten Netzwerk kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen preiszugeben." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-40551" }, { "cve": "CVE-2023-6135", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in der IBM Power Hardware Management Console. Dieser Fehler betrifft die Mozilla Network Security Services NIST-Kurve, die in Mozilla Firefox verwendet wird, und zwar durch einen als Minerva bekannten Side-Channel-Angriff, der die Wiederherstellung des privaten Schl\u00fcssels erm\u00f6glicht. Ein anonymer Angreifer kann diese Schwachstelle ausnutzen, indem er ein Opfer dazu bringt, eine speziell gestaltete Website zu besuchen, um vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-6135" }, { "cve": "CVE-2023-39615", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Power Hardware Management Console. Dieser Fehler besteht in Xmlsoft Libxml2 aufgrund eines Puffer\u00fcberlaufs. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, indem er eine manipulierte XML-Datei bereitstellt." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-39615" }, { "cve": "CVE-2023-5388", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Power Hardware Management Console. Dieser Fehler ist auf eine beobachtbare Zeitdiskrepanz in der numerischen Bibliothek zur\u00fcckzuf\u00fchren, die in NSS f\u00fcr die RSA-Kryptographie verwendet wird. Ein entfernter, authentisierter Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen preiszugeben und diese Informationen f\u00fcr weitere Angriffe zu verwenden." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-5388" }, { "cve": "CVE-2023-3446", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM Power Hardware Management Console. Diese Fehler betreffen die OpenSSL-Bibliothek aufgrund einer unsachgem\u00e4\u00dfen Behandlung von DH-Schl\u00fcsseln und Parametern w\u00e4hrend der Schl\u00fcsselvalidierung und -erzeugung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-3446" }, { "cve": "CVE-2023-3817", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM Power Hardware Management Console. Diese Fehler betreffen die OpenSSL-Bibliothek aufgrund einer unsachgem\u00e4\u00dfen Behandlung von DH-Schl\u00fcsseln und Parametern w\u00e4hrend der Schl\u00fcsselvalidierung und -erzeugung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-3817" }, { "cve": "CVE-2023-5678", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM Power Hardware Management Console. Diese Fehler betreffen die OpenSSL-Bibliothek aufgrund einer unsachgem\u00e4\u00dfen Behandlung von DH-Schl\u00fcsseln und Parametern w\u00e4hrend der Schl\u00fcsselvalidierung und -erzeugung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-5678" }, { "cve": "CVE-2024-34750", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Power Hardware Management Console. Diese Fehler betrifft den Apache Tomcat Server aufgrund eines Fehlers bei der Verarbeitung eines HTTP/2-Streams. Durch das Senden speziell gestalteter HTTP-Header kann ein entfernter, anonymer Angreifer diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2024-34750" }, { "cve": "CVE-2022-3094", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Power Hardware Management Console. Dieser Fehler betrifft ISC BIND aufgrund einer unsachgem\u00e4\u00dfen Speicherzuweisung, die es erm\u00f6glicht, UPDATE-Nachrichten zu senden, was zu einer Speicherersch\u00f6pfung f\u00fchrt. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2022-3094" }, { "cve": "CVE-2023-4641", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Power Hardware Management Console. Die shadow-utils Bibliothek ist von diesem Fehler betroffen, da Passwortinformationen unsachgem\u00e4\u00df gehandhabt werden, insbesondere weil der Puffer zum Speichern von Passw\u00f6rtern nicht gel\u00f6scht wird. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen preiszugeben." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-4641" }, { "cve": "CVE-2023-22745", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Power Hardware Management Console. Dieser Fehler betrifft die tpm2-tss Bibliothek aufgrund einer unsachgem\u00e4\u00dfen \u00dcberpr\u00fcfung der Grenzen in den Tss2_RC_SetHandler und Tss2_RC_Decode Funktionen, was zu einem Puffer\u00fcberlauf f\u00fchrt. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstelle zur Ausf\u00fchrung von beliebigem Code ausnutzen." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-22745" }, { "cve": "CVE-2023-52425", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Power Hardware Management Console. Dieser Fehler betrifft die expat-Bibliothek aufgrund einer unsachgem\u00e4\u00dfen Zuweisung von Systemressourcen. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, indem er eine speziell gestaltete Anfrage mit einem \u00fcberm\u00e4\u00dfig gro\u00dfen Token sendet." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-52425" } ] }
wid-sec-w-2024-1522
Vulnerability from csaf_certbund
Published
2024-07-03 22:00
Modified
2024-09-17 22:00
Summary
Apache Tomcat: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Apache Tomcat ist ein Web-Applikationsserver für verschiedene Plattformen.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Apache Tomcat ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apache Tomcat ist ein Web-Applikationsserver f\u00fcr verschiedene Plattformen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Apache Tomcat ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1522 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1522.json" }, { "category": "self", "summary": "WID-SEC-2024-1522 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1522" }, { "category": "external", "summary": "Red Hat Bugtracker vom 2024-07-03", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295651" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-07-03", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34750" }, { "category": "external", "summary": "RedHat Customer Portal vom 2024-07-03", "url": "https://access.redhat.com/security/cve/CVE-2024-34750" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2413-1 vom 2024-07-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018931.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2485-1 vom 2024-07-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018972.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2539-1 vom 2024-07-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018993.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4977 vom 2024-08-06", "url": "https://access.redhat.com/errata/RHSA-2024:4977" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4976 vom 2024-08-06", "url": "https://access.redhat.com/errata/RHSA-2024:4976" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5025 vom 2024-08-06", "url": "https://access.redhat.com/errata/RHSA-2024:5025" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5024 vom 2024-08-06", "url": "https://access.redhat.com/errata/RHSA-2024:5024" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASTOMCAT8.5-2024-020 vom 2024-08-13", "url": "https://alas.aws.amazon.com/AL2/ALASTOMCAT8.5-2024-020.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASTOMCAT9-2024-014 vom 2024-08-13", "url": "https://alas.aws.amazon.com/AL2/ALASTOMCAT9-2024-014.html" }, { "category": "external", "summary": "Atlassian Security Advisory JSDSERVER-15504 vom 2024-08-20", "url": "https://jira.atlassian.com/browse/JSDSERVER-15504" }, { "category": "external", "summary": "Atlassian Security Advisory CONFSERVER-97657 vom 2024-08-20", "url": "https://jira.atlassian.com/browse/CONFSERVER-97657" }, { "category": "external", "summary": "Atlassian Security Advisory JSWSERVER-26047 vom 2024-08-20", "url": "https://jira.atlassian.com/browse/JSWSERVER-26047" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5693 vom 2024-08-21", "url": "https://access.redhat.com/errata/RHSA-2024:5693" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5695 vom 2024-08-21", "url": "https://access.redhat.com/errata/RHSA-2024:5695" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5694 vom 2024-08-21", "url": "https://access.redhat.com/errata/RHSA-2024:5694" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-5694 vom 2024-08-22", "url": "https://linux.oracle.com/errata/ELSA-2024-5694.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-5693 vom 2024-08-22", "url": "https://linux.oracle.com/errata/ELSA-2024-5693.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5696 vom 2024-08-21", "url": "https://access.redhat.com/errata/RHSA-2024:5696" }, { "category": "external", "summary": "IBM Security Bulletin 7167584 vom 2024-09-05", "url": "https://www.ibm.com/support/pages/node/7167584" }, { "category": "external", "summary": "Camunda Security Notice 117 vom 2024-09-16", "url": "https://docs.camunda.org/security/notices/#notice-117" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:5693 vom 2024-09-17", "url": "https://errata.build.resf.org/RLSA-2024:5693" }, { "category": "external", "summary": "Atlassian Security Bulletin - September 17 2024", "url": "https://confluence.atlassian.com/security/security-bulletin-september-17-2024-1431249025.html" }, { "category": "external", "summary": "Bamboo Data Center Advisory", "url": "https://jira.atlassian.com/browse/BAM-25868" } ], "source_lang": "en-US", "title": "Apache Tomcat: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2024-09-17T22:00:00.000+00:00", "generator": { "date": "2024-09-18T08:10:10.445+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-1522", "initial_release_date": "2024-07-03T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-03T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-07-11T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-07-15T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-07-16T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-06T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-08-13T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-08-20T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Atlassian aufgenommen" }, { "date": "2024-08-21T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2024-09-04T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-09-16T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-09-17T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates aufgenommen" } ], "status": "final", "version": "11" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c11.0.0-M21", "product": { "name": "Apache Tomcat \u003c11.0.0-M21", "product_id": "T035809" } }, { "category": "product_version", "name": "11.0.0-M21", "product": { "name": "Apache Tomcat 11.0.0-M21", "product_id": "T035809-fixed", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:11.0.0-m21" } } }, { "category": "product_version_range", "name": "\u003c10.1.25", "product": { "name": "Apache Tomcat \u003c10.1.25", "product_id": "T035811" } }, { "category": "product_version", "name": "10.1.25", "product": { "name": "Apache Tomcat 10.1.25", "product_id": "T035811-fixed", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:10.1.25" } } }, { "category": "product_version_range", "name": "\u003c9.0.90", "product": { "name": "Apache Tomcat \u003c9.0.90", "product_id": "T035812" } }, { "category": "product_version", "name": "9.0.90", "product": { "name": "Apache Tomcat 9.0.90", "product_id": "T035812-fixed", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:9.0.90" } } } ], "category": "product_name", "name": "Tomcat" } ], "category": "vendor", "name": "Apache" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.2.17", "product": { "name": "Atlassian Bamboo \u003c9.2.17", "product_id": "T036976" } }, { "category": "product_version", "name": "9.2.17", "product": { "name": "Atlassian Bamboo 9.2.17", "product_id": "T036976-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:bamboo:9.2.17" } } }, { "category": "product_version_range", "name": "\u003c10.0.0", "product": { "name": "Atlassian Bamboo \u003c10.0.0", "product_id": "T037681" } }, { "category": "product_version", "name": "10.0.0", "product": { "name": "Atlassian Bamboo 10.0.0", "product_id": "T037681-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:bamboo:10.0.0" } } }, { "category": "product_version_range", "name": "\u003c9.6.4", "product": { "name": "Atlassian Bamboo \u003c9.6.4", "product_id": "T037682" } }, { "category": "product_version", "name": "9.6.4", "product": { "name": "Atlassian Bamboo 9.6.4", "product_id": "T037682-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:bamboo:9.6.4" } } } ], "category": "product_name", "name": "Bamboo" }, { "branches": [ { "category": "product_version_range", "name": "\u003c9.0.0", "product": { "name": "Atlassian Bitbucket \u003c9.0.0", "product_id": "T037684" } }, { "category": "product_version", "name": "9.0.0", "product": { "name": "Atlassian Bitbucket 9.0.0", "product_id": "T037684-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:bitbucket:9.0.0" } } }, { "category": "product_version_range", "name": "\u003c8.9.19", "product": { "name": "Atlassian Bitbucket \u003c8.9.19", "product_id": "T037685" } }, { "category": "product_version", "name": "8.9.19", "product": { "name": "Atlassian Bitbucket 8.9.19", "product_id": "T037685-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:bitbucket:8.9.19" } } }, { "category": "product_version_range", "name": "\u003c8.19.9", "product": { "name": "Atlassian Bitbucket \u003c8.19.9", "product_id": "T037686" } }, { "category": "product_version", "name": "8.19.9", "product": { "name": "Atlassian Bitbucket 8.19.9", "product_id": "T037686-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:bitbucket:8.19.9" } } } ], "category": "product_name", "name": "Bitbucket" }, { "branches": [ { "category": "product_version_range", "name": "Data Center \u003c9.0.1", "product": { "name": "Atlassian Confluence Data Center \u003c9.0.1", "product_id": "T036967" } }, { "category": "product_version", "name": "Data Center 9.0.1", "product": { "name": "Atlassian Confluence Data Center 9.0.1", "product_id": "T036967-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:confluence:9.0.1::data_center" } } }, { "category": "product_version_range", "name": "\u003c8.5.14 (LTS)", "product": { "name": "Atlassian Confluence \u003c8.5.14 (LTS)", "product_id": "T036968" } }, { "category": "product_version", "name": "8.5.14 (LTS)", "product": { "name": "Atlassian Confluence 8.5.14 (LTS)", "product_id": "T036968-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:confluence:8.5.14::lts" } } }, { "category": "product_version_range", "name": "\u003c7.19.26 (LTS)", "product": { "name": "Atlassian Confluence \u003c7.19.26 (LTS)", "product_id": "T036969" } }, { "category": "product_version", "name": "7.19.26 (LTS)", "product": { "name": "Atlassian Confluence 7.19.26 (LTS)", "product_id": "T036969-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:confluence:7.19.26::lts" } } } ], "category": "product_name", "name": "Confluence" }, { "branches": [ { "category": "product_version_range", "name": "Data Center \u003c9.17.1", "product": { "name": "Atlassian Jira Software Data Center \u003c9.17.1", "product_id": "T036961" } }, { "category": "product_version", "name": "Data Center 9.17.1", "product": { "name": "Atlassian Jira Software Data Center 9.17.1", "product_id": "T036961-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:9.17.1::data_center" } } }, { "category": "product_version_range", "name": "\u003c9.12.12 (LTS)", "product": { "name": "Atlassian Jira Software \u003c9.12.12 (LTS)", "product_id": "T036962" } }, { "category": "product_version", "name": "9.12.12 (LTS)", "product": { "name": "Atlassian Jira Software 9.12.12 (LTS)", "product_id": "T036962-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:9.12.12::lts" } } }, { "category": "product_version_range", "name": "\u003c9.4.25 (LTS)", "product": { "name": "Atlassian Jira Software \u003c9.4.25 (LTS)", "product_id": "T036963" } }, { "category": "product_version", "name": "9.4.25 (LTS)", "product": { "name": "Atlassian Jira Software 9.4.25 (LTS)", "product_id": "T036963-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:9.4.25::lts" } } }, { "category": "product_version_range", "name": "Service Management Data Center \u003c5.17.1", "product": { "name": "Atlassian Jira Software Service Management Data Center \u003c5.17.1", "product_id": "T036964" } }, { "category": "product_version", "name": "Service Management Data Center 5.17.1", "product": { "name": "Atlassian Jira Software Service Management Data Center 5.17.1", "product_id": "T036964-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:5.17.1::service_management_data_center" } } }, { "category": "product_version_range", "name": "Service Management \u003c5.12.12 (LTS)", "product": { "name": "Atlassian Jira Software Service Management \u003c5.12.12 (LTS)", "product_id": "T036965" } }, { "category": "product_version", "name": "Service Management 5.12.12 (LTS)", "product": { "name": "Atlassian Jira Software Service Management 5.12.12 (LTS)", "product_id": "T036965-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:5.12.12::service_management_data_center_lts" } } }, { "category": "product_version_range", "name": "Service Management \u003c5.4.25 (LTS)", "product": { "name": "Atlassian Jira Software Service Management \u003c5.4.25 (LTS)", "product_id": "T036966" } }, { "category": "product_version", "name": "Service Management 5.4.25 (LTS)", "product": { "name": "Atlassian Jira Software Service Management 5.4.25 (LTS)", "product_id": "T036966-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:5.4.25::service_management_data_center_lts" } } } ], "category": "product_name", "name": "Jira Software" } ], "category": "vendor", "name": "Atlassian" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "for zos 10.1-10.1.0.4", "product": { "name": "IBM Integration Bus for zos 10.1-10.1.0.4", "product_id": "T037307", "product_identification_helper": { "cpe": "cpe:/a:ibm:integration_bus:for_zos_10.1_-_10.1.0.4" } } } ], "category": "product_name", "name": "Integration Bus" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.22.0-alpha5", "product": { "name": "Open Source Camunda \u003c7.22.0-alpha5", "product_id": "T037648" } }, { "category": "product_version", "name": "7.22.0-alpha5", "product": { "name": "Open Source Camunda 7.22.0-alpha5", "product_id": "T037648-fixed", "product_identification_helper": { "cpe": "cpe:/a:camunda:camunda:7.22.0-alpha5" } } }, { "category": "product_version_range", "name": "\u003c7.21.4", "product": { "name": "Open Source Camunda \u003c7.21.4", "product_id": "T037649" } }, { "category": "product_version", "name": "7.21.4", "product": { "name": "Open Source Camunda 7.21.4", "product_id": "T037649-fixed", "product_identification_helper": { "cpe": "cpe:/a:camunda:camunda:7.21.4" } } }, { "category": "product_version_range", "name": "\u003c7.20.8", "product": { "name": "Open Source Camunda \u003c7.20.8", "product_id": "T037650" } }, { "category": "product_version", "name": "7.20.8", "product": { "name": "Open Source Camunda 7.20.8", "product_id": "T037650-fixed", "product_identification_helper": { "cpe": "cpe:/a:camunda:camunda:7.20.8" } } }, { "category": "product_version_range", "name": "\u003c7.19.15", "product": { "name": "Open Source Camunda \u003c7.19.15", "product_id": "T037651" } }, { "category": "product_version", "name": "7.19.15", "product": { "name": "Open Source Camunda 7.19.15", "product_id": "T037651-fixed", "product_identification_helper": { "cpe": "cpe:/a:camunda:camunda:7.19.15" } } } ], "category": "product_name", "name": "Camunda" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-34750", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Apache Tomcat, die auf eine unsachgem\u00e4\u00dfe Behandlung von http/2-Streams und einen unkontrollierten Ressourcenverbrauch zur\u00fcckzuf\u00fchren ist, wodurch bestimmte Verbindungen offen bleiben k\u00f6nnen. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "T036968", "T035812", "T036969", "T035811", "T036964", "67646", "T036965", "T036966", "T036967", "T036961", "T036962", "T036963", "T004914", "T037650", "T037651", "T035809", "398363", "T036976", "T037307", "T037648", "T037649", "T037686", "T037682", "T032255", "T037684", "T037685", "T037681", "T002207" ] }, "release_date": "2024-07-03T22:00:00.000+00:00", "title": "CVE-2024-34750" } ] }
wid-sec-w-2024-1905
Vulnerability from csaf_certbund
Published
2024-08-21 22:00
Modified
2024-09-05 22:00
Summary
IBM QRadar SIEM: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM QRadar Security Information and Event Management (SIEM) bietet Unterstützung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.
Angriff
Ein entfernter, anonymer oder lokaler Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, Daten zu manipulieren, vertrauliche Informationen offenzulegen, eine Man-in-the-Middle-Situation zu schaffen, Sicherheitsmaßnahmen zu umgehen oder eine Denial-of-Service-Situation zu schaffen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM QRadar Security Information and Event Management (SIEM) bietet Unterst\u00fctzung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder lokaler Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, eine Man-in-the-Middle-Situation zu schaffen, Sicherheitsma\u00dfnahmen zu umgehen oder eine Denial-of-Service-Situation zu schaffen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1905 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1905.json" }, { "category": "self", "summary": "WID-SEC-2024-1905 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1905" }, { "category": "external", "summary": "IBM Security Bulletin 7166204 vom 2024-08-21", "url": "https://www.ibm.com/support/pages/node/7166204" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12606 vom 2024-09-03", "url": "https://linux.oracle.com/errata/ELSA-2024-12606.html" }, { "category": "external", "summary": "ORACLE OVMSA-2024-0011 vom 2024-09-04", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2024-September/001099.html" }, { "category": "external", "summary": "IBM Security Bulletin 7167662 vom 2024-09-05", "url": "https://www.ibm.com/support/pages/node/7167662" } ], "source_lang": "en-US", "title": "IBM QRadar SIEM: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-09-05T22:00:00.000+00:00", "generator": { "date": "2024-09-06T08:13:42.015+00:00", "engine": { "name": "BSI-WID", "version": "1.3.6" } }, "id": "WID-SEC-W-2024-1905", "initial_release_date": "2024-08-21T22:00:00.000+00:00", "revision_history": [ { "date": "2024-08-21T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-09-02T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-04T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von ORACLE aufgenommen" }, { "date": "2024-09-05T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "24.0.0", "product": { "name": "IBM Business Automation Workflow 24.0.0", "product_id": "T036570", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:24.0.0" } } } ], "category": "product_name", "name": "Business Automation Workflow" }, { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP9 IF02", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP9 IF02", "product_id": "T037023" } }, { "category": "product_version", "name": "7.5.0 UP9 IF02", "product": { "name": "IBM QRadar SIEM 7.5.0 UP9 IF02", "product_id": "T037023-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up9_if02" } } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-26555", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2020-26555" }, { "cve": "CVE-2021-46909", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2021-46909" }, { "cve": "CVE-2021-46972", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2021-46972" }, { "cve": "CVE-2021-47069", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2021-47069" }, { "cve": "CVE-2021-47073", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2021-47073" }, { "cve": "CVE-2021-47236", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2021-47236" }, { "cve": "CVE-2021-47310", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2021-47310" }, { "cve": "CVE-2021-47311", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2021-47311" }, { "cve": "CVE-2021-47353", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2021-47353" }, { "cve": "CVE-2021-47356", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2021-47356" }, { "cve": "CVE-2021-47456", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2021-47456" }, { "cve": "CVE-2021-47495", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2021-47495" }, { "cve": "CVE-2023-43788", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2023-43788" }, { "cve": "CVE-2023-43789", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2023-43789" }, { "cve": "CVE-2023-4692", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2023-4692" }, { "cve": "CVE-2023-4693", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2023-4693" }, { "cve": "CVE-2023-5090", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2023-5090" }, { "cve": "CVE-2023-52464", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2023-52464" }, { "cve": "CVE-2023-52560", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2023-52560" }, { "cve": "CVE-2023-52615", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2023-52615" }, { "cve": "CVE-2023-52626", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2023-52626" }, { "cve": "CVE-2023-52667", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2023-52667" }, { "cve": "CVE-2023-52669", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2023-52669" }, { "cve": "CVE-2023-52675", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2023-52675" }, { "cve": "CVE-2023-52686", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2023-52686" }, { "cve": "CVE-2023-52700", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2023-52700" }, { "cve": "CVE-2023-52703", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2023-52703" }, { "cve": "CVE-2023-52781", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2023-52781" }, { "cve": "CVE-2023-52813", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2023-52813" }, { "cve": "CVE-2023-52835", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2023-52835" }, { "cve": "CVE-2023-52877", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2023-52877" }, { "cve": "CVE-2023-52878", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2023-52878" }, { "cve": "CVE-2023-52881", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2023-52881" }, { "cve": "CVE-2023-7008", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2023-7008" }, { "cve": "CVE-2024-1048", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-1048" }, { "cve": "CVE-2024-22365", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-22365" }, { "cve": "CVE-2024-26583", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-26583" }, { "cve": "CVE-2024-26584", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-26584" }, { "cve": "CVE-2024-26585", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-26585" }, { "cve": "CVE-2024-26656", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-26656" }, { "cve": "CVE-2024-26675", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-26675" }, { "cve": "CVE-2024-26735", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-26735" }, { "cve": "CVE-2024-26759", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-26759" }, { "cve": "CVE-2024-26801", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-26801" }, { "cve": "CVE-2024-26804", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-26804" }, { "cve": "CVE-2024-26826", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-26826" }, { "cve": "CVE-2024-26859", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-26859" }, { "cve": "CVE-2024-26906", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-26906" }, { "cve": "CVE-2024-26907", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-26907" }, { "cve": "CVE-2024-26974", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-26974" }, { "cve": "CVE-2024-26982", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-26982" }, { "cve": "CVE-2024-27397", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-27397" }, { "cve": "CVE-2024-27410", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-27410" }, { "cve": "CVE-2024-34750", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-34750" }, { "cve": "CVE-2024-35789", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-35789" }, { "cve": "CVE-2024-35835", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-35835" }, { "cve": "CVE-2024-35838", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-35838" }, { "cve": "CVE-2024-35845", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-35845" }, { "cve": "CVE-2024-35852", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-35852" }, { "cve": "CVE-2024-35853", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-35853" }, { "cve": "CVE-2024-35854", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-35854" }, { "cve": "CVE-2024-35855", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-35855" }, { "cve": "CVE-2024-35888", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-35888" }, { "cve": "CVE-2024-35890", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-35890" }, { "cve": "CVE-2024-35958", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-35958" }, { "cve": "CVE-2024-35959", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-35959" }, { "cve": "CVE-2024-35960", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-35960" }, { "cve": "CVE-2024-36004", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-36004" }, { "cve": "CVE-2024-36007", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-36007" }, { "cve": "CVE-2024-5564", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler bestehen in mehreren Komponenten wie systemd, Grub oder dem Linux-Kernel, u. a. aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-Schwachstelle, einer unsachgem\u00e4\u00dfen Pr\u00fcfung der Grenzen oder eines Puffer\u00fcberlaufs und mehr. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Man-in-the-Middle-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T036570", "T004914", "T037023" ] }, "release_date": "2024-08-21T22:00:00.000+00:00", "title": "CVE-2024-5564" } ] }
ghsa-wm9w-rjj3-j356
Vulnerability from github
Published
2024-07-03 21:39
Modified
2024-07-05 20:39
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Summary
Apache Tomcat - Denial of Service
Details
Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89.
Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat.embed:tomcat-embed-core" }, "ranges": [ { "events": [ { "introduced": "11.0.0-M1" }, { "fixed": "11.0.0-M21" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat.embed:tomcat-embed-core" }, "ranges": [ { "events": [ { "introduced": "10.1.0-M1" }, { "fixed": "10.1.25" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat.embed:tomcat-embed-core" }, "ranges": [ { "events": [ { "introduced": "9.0.0-M1" }, { "fixed": "9.0.90" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-coyote" }, "ranges": [ { "events": [ { "introduced": "11.0.0-M1" }, { "fixed": "11.0.0-M21" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-coyote" }, "ranges": [ { "events": [ { "introduced": "10.1.0-M1" }, { "fixed": "10.1.25" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-coyote" }, "ranges": [ { "events": [ { "introduced": "9.0.0-M1" }, { "fixed": "9.0.90" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-34750" ], "database_specific": { "cwe_ids": [ "CWE-400", "CWE-755" ], "github_reviewed": true, "github_reviewed_at": "2024-07-05T20:39:41Z", "nvd_published_at": "2024-07-03T20:15:04Z", "severity": "HIGH" }, "details": "Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89.\n\nUsers are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.\n\n", "id": "GHSA-wm9w-rjj3-j356", "modified": "2024-07-05T20:39:42Z", "published": "2024-07-03T21:39:44Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34750" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/2344a4c0d03e307ba6b8ab6dc8b894cc8bac63f2" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/2afae300c9ac9c0e516e2e9de580847d925365c3" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/9fec9a82887853402833a80b584e3762c7423f5f" }, { "type": "PACKAGE", "url": "https://github.com/apache/tomcat" }, { "type": "WEB", "url": "https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-10.html" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-11.html" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-9.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "Apache Tomcat - Denial of Service" }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.