Mageia 2021-0020: tomcat security update
Summary
While investigating Apache issue 64830 it was discovered that Apache Tomcat
could re-use an HTTP request header value from the previous stream received on
an HTTP/2 connection for the request associated with the subsequent stream.
While this would most likely lead to an error and the closure of the HTTP/2
connection, it is possible that information could leak between requests
(CVE-2020-17527).
The tomcat package has been updated to version 9.0.39, and patched to fix
this issue.
References
- https://bugs.mageia.org/show_bug.cgi?id=27739
- https://tomcat.apache.org/security-9.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17527
Resolution
MGASA-2021-0020 - Updated tomcat packages fix security vulnerability
SRPMS
- 7/core/tomcat-9.0.39-1.mga7