Mageia 2021-0020: tomcat security update
Mageia 2021-0020: tomcat security update
While investigating Apache issue 64830 it was discovered that Apache Tomcat could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests
MGASA-2021-0020 - Updated tomcat packages fix security vulnerability Publication date: 10 Jan 2021 URL: https://advisories.mageia.org/MGASA-2021-0020.html Type: security Affected Mageia releases: 7 CVE: CVE-2020-17527 While investigating Apache issue 64830 it was discovered that Apache Tomcat could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests (CVE-2020-17527). The tomcat package has been updated to version 9.0.39, and patched to fix this issue. References: - https://bugs.mageia.org/show_bug.cgi?id=27739 - https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17527 SRPMS: - 7/core/tomcat-9.0.39-1.mga7