USN-7106-1: Tomcat vulnerabilities
13 November 2024
Several security issues were fixed in Tomcat.
Releases
Packages
- tomcat9 - Servlet and JSP engine
Details
It was discovered that Tomcat did not include the secure attribute for
session cookies when using the RemoteIpFilter with requests from a
reverse proxy. An attacker could possibly use this issue to leak
sensitive information. (CVE-2023-28708)
It was discovered that Tomcat had a vulnerability in its FORM
authentication feature, leading to an open redirect attack. An attacker
could possibly use this issue to perform phishing attacks. (CVE-2023-41080)
It was discovered that Tomcat incorrectly recycled certain objects,
which could lead to information leaking from one request to the next.
An attacker could potentially use this issue to leak sensitive
information. (CVE-2023-42795)
It was discovered that Tomcat incorrectly handled HTTP trailer headers. A
remote attacker could possibly use this issue to perform HTTP request
smuggling. (CVE-2023-45648)
It was discovered that Tomcat incorrectly handled socket cleanup, which
could lead to websocket connections staying open. An attacker could
possibly use this issue to cause a denial of service. (CVE-2024-23672)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04
-
libtomcat9-java
-
9.0.58-1ubuntu0.1+esm4
Available with Ubuntu Pro
-
tomcat9
-
9.0.58-1ubuntu0.1+esm4
Available with Ubuntu Pro
Ubuntu 20.04
Ubuntu 18.04
-
libtomcat9-java
-
9.0.16-3ubuntu0.18.04.2+esm4
Available with Ubuntu Pro
-
tomcat9
-
9.0.16-3ubuntu0.18.04.2+esm4
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.