First published: Mon Jan 29 2024(Updated: )
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.<br>Security Fix(es):<br><li> tomcat: HTTP request smuggling via malformed trailer headers (CVE-2023-46589)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tomcat | <9.0.62-27.el8_9.3 | 9.0.62-27.el8_9.3 |
redhat/tomcat | <9.0.62-27.el8_9.3 | 9.0.62-27.el8_9.3 |
redhat/tomcat-admin-webapps | <9.0.62-27.el8_9.3 | 9.0.62-27.el8_9.3 |
redhat/tomcat-docs-webapp | <9.0.62-27.el8_9.3 | 9.0.62-27.el8_9.3 |
redhat/tomcat-el | <3.0-api-9.0.62-27.el8_9.3 | 3.0-api-9.0.62-27.el8_9.3 |
redhat/tomcat-jsp | <2.3-api-9.0.62-27.el8_9.3 | 2.3-api-9.0.62-27.el8_9.3 |
redhat/tomcat-lib | <9.0.62-27.el8_9.3 | 9.0.62-27.el8_9.3 |
redhat/tomcat-servlet | <4.0-api-9.0.62-27.el8_9.3 | 4.0-api-9.0.62-27.el8_9.3 |
redhat/tomcat-webapps | <9.0.62-27.el8_9.3 | 9.0.62-27.el8_9.3 |
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux for ARM 64 | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux Server for IBM z Systems |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2024:0539 has been classified with an important severity level due to the vulnerability in Apache Tomcat.
To fix RHSA-2024:0539, you should update Apache Tomcat to version 9.0.62-27.el8_9.3 or later.
The main vulnerability addressed in RHSA-2024:0539 is HTTP request smuggling via malformed trailer headers, identified as CVE-2023-46589.
RHSA-2024:0539 affects various versions of Red Hat Enterprise Linux, including those for x86_64, ARM 64, Power, and IBM z Systems.
The components impacted by RHSA-2024:0539 include tomcat, tomcat-admin-webapps, tomcat-docs-webapp, and several tomcat API packages.