CVE-2023-34981

NameCVE-2023-34981
DescriptionA regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS messare woudl be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previous request leading to an information leak.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tomcat10 (PTS)bookworm (security), bookworm10.1.6-1+deb12u2fixed
sid, trixie10.1.33-1fixed
tomcat7 (PTS)jessie, jessie (lts)7.0.56-3+really7.0.109-1+deb8u6fixed
stretch7.0.75-1fixed
tomcat8 (PTS)jessie, jessie (lts)8.0.14-1+deb8u28fixed
stretch (security)8.5.54-0+deb9u8fixed
stretch (lts), stretch8.5.54-0+deb9u15fixed
tomcat9 (PTS)buster (security), buster, buster (lts)9.0.31-1~deb10u12fixed
bullseye (security), bullseye9.0.43-2~deb11u10fixed
bookworm9.0.70-2fixed
sid, trixie9.0.95-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tomcat10sourcebookworm(not affected)
tomcat10source(unstable)10.1.10-1
tomcat7source(unstable)(not affected)
tomcat8sourcejessie(not affected)
tomcat8sourcestretch(not affected)
tomcat8source(unstable)(unfixed)
tomcat9source(unstable)(not affected)

Notes

[bookworm] - tomcat10 <not-affected> (Issue introduced in 10.1.8)
- tomcat9 <not-affected> (Vulnerable code introduced in 9.0.74)
https://lists.apache.org/thread/j1ksjh9m9gx1q60rtk1sbzmxhvj5h5qz
Introduced due to fix for: https://bz.apache.org/bugzilla/show_bug.cgi?id=66512
Fixed by: https://bz.apache.org/bugzilla/show_bug.cgi?id=66591
- tomcat7 <not-affected> (Vulnerable code introduced later)
[stretch] - tomcat8 <not-affected> (Vulnerable code introduced in 8.5.88)
[jessie] - tomcat8 <not-affected> (Vulnerable code introduced later)

Search for package or bug name: Reporting problems