ELSA-2023-5928

ELSA-2023-5928 - tomcat security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2023-10-24

Description


[1:9.0.62-5.2]
- HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
(CVE-2023-44487)


Related CVEs


CVE-2023-44487

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 8 (aarch64) tomcat-9.0.62-5.el8_8.2.src.rpm79e3139aef37a271bfe0c0cb237aa235644ba6a2bee82152ee40affbd4fe2f48-ol8_aarch64_appstream
tomcat-9.0.62-5.el8_8.2.noarch.rpm7dd14164e4d75bf26537a1a1504a35b84cecd0f7e9b70f6401ed477bc20f5392-ol8_aarch64_appstream
tomcat-admin-webapps-9.0.62-5.el8_8.2.noarch.rpm90266f61864eeab4f18c8e1e5d47ef301517d17b0ab8e849f84000feb22b8336-ol8_aarch64_appstream
tomcat-docs-webapp-9.0.62-5.el8_8.2.noarch.rpm6dd78b30d26e3b2e7b53369db4697563b05ea208f3882cc28ebb2de95c47677c-ol8_aarch64_appstream
tomcat-el-3.0-api-9.0.62-5.el8_8.2.noarch.rpme8e5fdae55243bfd6152192d1f21cddd336594d5552af5cef63bed91d5197bd4-ol8_aarch64_appstream
tomcat-jsp-2.3-api-9.0.62-5.el8_8.2.noarch.rpm3938b1365d5f34e0d73084522babacee9a4b1e81c1b61bd7b055bed873121ee1-ol8_aarch64_appstream
tomcat-lib-9.0.62-5.el8_8.2.noarch.rpm1f0a03df10807282b682be5769dad81e4b45f6953e9cecd5e58b443017f3bdef-ol8_aarch64_appstream
tomcat-servlet-4.0-api-9.0.62-5.el8_8.2.noarch.rpmf5de6d0b2490ab8e5cb20bb77067bce5ad5f2bd24d3fac686502f061543de710-ol8_aarch64_appstream
tomcat-webapps-9.0.62-5.el8_8.2.noarch.rpmaae034741f442eb97a8748094a505a398c148b6ea9a80fe9bd0db8a1dc99afe1-ol8_aarch64_appstream
Oracle Linux 8 (x86_64) tomcat-9.0.62-5.el8_8.2.src.rpm79e3139aef37a271bfe0c0cb237aa235644ba6a2bee82152ee40affbd4fe2f48-ol8_x86_64_appstream
tomcat-9.0.62-5.el8_8.2.noarch.rpm7dd14164e4d75bf26537a1a1504a35b84cecd0f7e9b70f6401ed477bc20f5392-ol8_x86_64_appstream
tomcat-admin-webapps-9.0.62-5.el8_8.2.noarch.rpm90266f61864eeab4f18c8e1e5d47ef301517d17b0ab8e849f84000feb22b8336-ol8_x86_64_appstream
tomcat-docs-webapp-9.0.62-5.el8_8.2.noarch.rpm6dd78b30d26e3b2e7b53369db4697563b05ea208f3882cc28ebb2de95c47677c-ol8_x86_64_appstream
tomcat-el-3.0-api-9.0.62-5.el8_8.2.noarch.rpme8e5fdae55243bfd6152192d1f21cddd336594d5552af5cef63bed91d5197bd4-ol8_x86_64_appstream
tomcat-jsp-2.3-api-9.0.62-5.el8_8.2.noarch.rpm3938b1365d5f34e0d73084522babacee9a4b1e81c1b61bd7b055bed873121ee1-ol8_x86_64_appstream
tomcat-lib-9.0.62-5.el8_8.2.noarch.rpm1f0a03df10807282b682be5769dad81e4b45f6953e9cecd5e58b443017f3bdef-ol8_x86_64_appstream
tomcat-servlet-4.0-api-9.0.62-5.el8_8.2.noarch.rpmf5de6d0b2490ab8e5cb20bb77067bce5ad5f2bd24d3fac686502f061543de710-ol8_x86_64_appstream
tomcat-webapps-9.0.62-5.el8_8.2.noarch.rpmaae034741f442eb97a8748094a505a398c148b6ea9a80fe9bd0db8a1dc99afe1-ol8_x86_64_appstream



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete