Bugzilla – Bug 1217649
VUL-0: CVE-2023-46589: Apache Tomcat: HTTP request smuggling due to incorrect headers parsing
Last modified: 2024-02-15 16:40:13 UTC
Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82 and from 8.5.0 through 8.5.95 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Users are recommended to upgrade to version 11.0.0-M11 onwards, 10.1.16 onwards, 9.0.83 onwards or 8.5.96 onwards, which fix the issue. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46589 https://lists.apache.org/thread/0rqq6ktozqc42ro8hhxdmmdjm1k1tpxr Patch commit: Apache Tomcat 11.0.0-M1 to 11.0.0-M10 - https://github.com/apache/tomcat/commit/6f181e1062a472bc5f0234980f66cbde42c1041b Apache Tomcat 10.1.0-M1 to 10.1.15 - https://github.com/apache/tomcat/commit/b5776d769bffeade865061bc8ecbeb2b56167b08 Apache Tomcat 9.0.0-M1 to 9.0.82 - https://github.com/apache/tomcat/commit/7a2d8818fcea0b51747a67af9510ce7977245ebd Apache Tomcat 8.5.0 to 8.5.95 - https://github.com/apache/tomcat/commit/aa92971e879a519384c517febc39fd04c48d4642
I created MR for: SUSE:SLE-15-SP1:Update SUSE:SLE-12-SP4:Update Factory As soon the factory request will be accepted, I'll sync the changes to: SUSE:ALP:Source:Standard:1.0 SUSE:SLE-15-SP2:Update About SUSE:SLE-12-SP2:Update, the upstream code is 8.0 and it's EOL since 2018. I tried to apply the patch, also doing other changes, but it was not possible to do that. Please let me know if it's really required the fix for this product. Thanks
This is an autogenerated message for OBS integration: This bug (1217649) was mentioned in https://build.opensuse.org/request/show/1139530 Factory / tomcat
This is an autogenerated message for OBS integration: This bug (1217649) was mentioned in https://build.opensuse.org/request/show/1139643 Factory / tomcat10
request created also for SLE-SERVER_12-SP3-TERADATA
SUSE-SU-2024:0209-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1217649 CVE References: CVE-2023-46589 Sources used: SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): tomcat-9.0.36-150100.4.105.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): tomcat-9.0.36-150100.4.105.1 SUSE CaaS Platform 4.0 (src): tomcat-9.0.36-150100.4.105.1 SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): tomcat-9.0.36-150100.4.105.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:0208-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1217649 CVE References: CVE-2023-46589 Sources used: openSUSE Leap 15.5 (src): tomcat10-10.1.18-150200.5.8.1 Web and Scripting Module 15-SP5 (src): tomcat10-10.1.18-150200.5.8.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:0206-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1217649 CVE References: CVE-2023-46589 Sources used: SUSE Linux Enterprise High Performance Computing 12 SP5 (src): tomcat-9.0.36-3.118.1 SUSE Linux Enterprise Server 12 SP5 (src): tomcat-9.0.36-3.118.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): tomcat-9.0.36-3.118.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:0472-1: An update that solves five vulnerabilities and has two security fixes can now be installed. Category: security (important) Bug References: 1216118, 1216119, 1216120, 1217402, 1217649, 1217768, 1219208 CVE References: CVE-2023-42794, CVE-2023-42795, CVE-2023-45648, CVE-2023-46589, CVE-2024-22029 Sources used: openSUSE Leap 15.5 (src): tomcat-9.0.85-150200.57.1 Web and Scripting Module 15-SP5 (src): tomcat-9.0.85-150200.57.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): tomcat-9.0.85-150200.57.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): tomcat-9.0.85-150200.57.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src): tomcat-9.0.85-150200.57.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src): tomcat-9.0.85-150200.57.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): tomcat-9.0.85-150200.57.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): tomcat-9.0.85-150200.57.1 SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src): tomcat-9.0.85-150200.57.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): tomcat-9.0.85-150200.57.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): tomcat-9.0.85-150200.57.1 SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): tomcat-9.0.85-150200.57.1 SUSE Manager Server 4.3 (src): tomcat-9.0.85-150200.57.1 SUSE Enterprise Storage 7.1 (src): tomcat-9.0.85-150200.57.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.