-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.3880
                          tomcat9 security update
                             15 November 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           tomcat9
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-42340  

Reference:         ESB-2021.3418

Original Bulletin: 
   http://www.debian.org/security/2021/dsa-5009

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-5009-1                   security@debian.org
https://www.debian.org/security/                          Markus Koschany
November 12, 2021                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : tomcat9
CVE ID         : CVE-2021-42340

Apache Tomcat, the servlet and JSP engine, did not properly release an HTTP
upgrade connection for WebSocket connections once the WebSocket connection was
closed. This created a memory leak that, over time, could lead to a denial of
service via an OutOfMemoryError.

For the stable distribution (bullseye), this problem has been fixed in
version 9.0.43-2~deb11u3.

We recommend that you upgrade your tomcat9 packages.

For the detailed security status of tomcat9 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/tomcat9

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=wISU
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYZGin+NLKJtyKPYoAQgW+w/9Gfw+sjm0RSQHaySq42ayhljeYNrWxTxs
hBZ3fZR7ADApD7S26N9g0+0q3yIQx+Q86mJei8cRx9qCN4hk0QztklH78QxL2sCi
OaXh9lBui30lztYU3DRDjf6svJp45l+KkwGUzj6dS8Wckf3h2asDT1+v9+yC5Qsr
70DcNOrlqeqJKTQoyn3HJn9RBIyqON55P2q3Hy4AcFNdi9s90KTnr8HqThHafwmw
uDO9qh1EGCtoJmNkyR+2B9Fzyjz8Gt0WkpP1Mbm+aD5uzWqt9musAQXS1LDQgMYr
o0iMhBSRu+Mzl+/vruh7HFlpK4e1Czt+V87AhJSjJen0kwF0+Qbv/vqzfVGyOdnA
hNuXJ1QyETj24n9hpp3iJXQPYg028bUpIWXEltXLgyEdD0BWsNvknOpW6X7Gi3wi
jet9pwPyxopcs2tRDgRJWjZBwjtpAiv6m3n6eVH4rdWQ6uu9ExnStx5u7WOSfOWa
CJn/20/Wp4NQVTjgdbYEAQINjfn6dQox9j+d1ODUSy/ToT4kGUedde1VgPhAO4gg
B4V6BR2MA+KaQxBnVQsGjnsmmytFSjYl99N/etMxwhehoojznb13FpIXD1hb/j+8
kYaKxOlQGD+qXCZ4Dqs3arqKLnVYu7Kdg4QnVxC7a352gYtN4hiE/71LupvK7Dov
vOcY6vWwvsU=
=ypV/
-----END PGP SIGNATURE-----