ELSA-2023-5929

ELSA-2023-5929 - tomcat security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2023-10-23

Description


[1:9.0.62-11.3]
- HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
(CVE-2023-44487)


Related CVEs


CVE-2023-44487

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 9 (aarch64) tomcat-9.0.62-11.el9_2.3.src.rpme66fed9dfbfbba999e88b9c61344f2046cdfbb1973bcfd83b618f0eb7eb8c975-ol9_aarch64_appstream
tomcat-9.0.62-11.el9_2.3.noarch.rpmfe3df7b2fac1220f61bc3e0d2350b1801c9ec0fd4d8ce73623ff5a4368d3ec23-ol9_aarch64_appstream
tomcat-admin-webapps-9.0.62-11.el9_2.3.noarch.rpm621f9780aa12be5ac741fe1b9f2673de15e232cf8e0ceab7cebc103ae8db6ab5-ol9_aarch64_appstream
tomcat-docs-webapp-9.0.62-11.el9_2.3.noarch.rpmf508f52e527669bb63e57a8b671eb4f2fa5702321dd905617ca38b1d8b79dc3d-ol9_aarch64_appstream
tomcat-el-3.0-api-9.0.62-11.el9_2.3.noarch.rpme135da3f15162ee4697d8cd771fe451e50d17148fd2ee69a7203ac79b1847168-ol9_aarch64_appstream
tomcat-jsp-2.3-api-9.0.62-11.el9_2.3.noarch.rpm030f50c8d40953d73ffd5243ef82eaa50084d034047d3f523da2ae71cc24d394-ol9_aarch64_appstream
tomcat-lib-9.0.62-11.el9_2.3.noarch.rpm114129fc98fa96c502a1db7a8f3e5b577c52648de2f116dde4ea2722368f35fc-ol9_aarch64_appstream
tomcat-servlet-4.0-api-9.0.62-11.el9_2.3.noarch.rpm553a59a82e99b2e536e306284563be71b66759dad79f2ad8835250a119c4e4ac-ol9_aarch64_appstream
tomcat-webapps-9.0.62-11.el9_2.3.noarch.rpm7b1c925e4f1caedbc320d55c8e2294c9fd628528733d1aedaf5616acda661527-ol9_aarch64_appstream
Oracle Linux 9 (x86_64) tomcat-9.0.62-11.el9_2.3.src.rpme66fed9dfbfbba999e88b9c61344f2046cdfbb1973bcfd83b618f0eb7eb8c975-ol9_x86_64_appstream
tomcat-9.0.62-11.el9_2.3.noarch.rpmfe3df7b2fac1220f61bc3e0d2350b1801c9ec0fd4d8ce73623ff5a4368d3ec23-ol9_x86_64_appstream
tomcat-admin-webapps-9.0.62-11.el9_2.3.noarch.rpm621f9780aa12be5ac741fe1b9f2673de15e232cf8e0ceab7cebc103ae8db6ab5-ol9_x86_64_appstream
tomcat-docs-webapp-9.0.62-11.el9_2.3.noarch.rpmf508f52e527669bb63e57a8b671eb4f2fa5702321dd905617ca38b1d8b79dc3d-ol9_x86_64_appstream
tomcat-el-3.0-api-9.0.62-11.el9_2.3.noarch.rpme135da3f15162ee4697d8cd771fe451e50d17148fd2ee69a7203ac79b1847168-ol9_x86_64_appstream
tomcat-jsp-2.3-api-9.0.62-11.el9_2.3.noarch.rpm030f50c8d40953d73ffd5243ef82eaa50084d034047d3f523da2ae71cc24d394-ol9_x86_64_appstream
tomcat-lib-9.0.62-11.el9_2.3.noarch.rpm114129fc98fa96c502a1db7a8f3e5b577c52648de2f116dde4ea2722368f35fc-ol9_x86_64_appstream
tomcat-servlet-4.0-api-9.0.62-11.el9_2.3.noarch.rpm553a59a82e99b2e536e306284563be71b66759dad79f2ad8835250a119c4e4ac-ol9_x86_64_appstream
tomcat-webapps-9.0.62-11.el9_2.3.noarch.rpm7b1c925e4f1caedbc320d55c8e2294c9fd628528733d1aedaf5616acda661527-ol9_x86_64_appstream



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete