[CLSA-2026:1777305243] Fix CVE(s): CVE-2024-38286
Type:
security
Severity:
Important
Release date:
2026-04-27 20:21:07 UTC
Description:
* SECURITY UPDATE: Denial of Service caused by unbounded TLS handshake wrap queue in SecureNio2Channel / SecureNioChannel. Backport upstream fix from 9.0.x commit 76c5cce6f0bcef14b0c21c38910371ca7d322d13. - debian/patches/CVE-2024-38286.patch: cap the handshake wrap queue at HANDSHAKE_WRAP_QUEUE_LENGTH_LIMIT (100) and close the connection with a localised error message if the cap is exceeded, covering both Nio2 and Nio connector variants. Also includes upstream follow-up bfa5de95ad ("Avoid possible lost update") which converts the SecureNio2Channel counter to AtomicInteger and resets it in reset() to prevent a non-atomic read-modify-write race. - CVE-2024-38286
Updated packages:
  • libtomcat9-embed-java_9.0.31-1ubuntu0.9+tuxcare.els3_all.deb
    sha:9d9bac67ec702ce130bd725a04bc4c7b84b4fa64
  • libtomcat9-java_9.0.31-1ubuntu0.9+tuxcare.els3_all.deb
    sha:9ea9001494a5d805153d85a8b28214c3ea0011b3
  • tomcat9_9.0.31-1ubuntu0.9+tuxcare.els3_all.deb
    sha:120fe3f77807b58ec2aaab5c9de13334df9cb6d8
  • tomcat9-admin_9.0.31-1ubuntu0.9+tuxcare.els3_all.deb
    sha:cb36ab4c4b56489c817bca9376ac90ecf7545519
  • tomcat9-common_9.0.31-1ubuntu0.9+tuxcare.els3_all.deb
    sha:e97fbc52c26d8dddba23d06756908ecee9efe80a
  • tomcat9-docs_9.0.31-1ubuntu0.9+tuxcare.els3_all.deb
    sha:ec3779a4423f364cebe02d315ad5fcd20e3430bb
  • tomcat9-examples_9.0.31-1ubuntu0.9+tuxcare.els3_all.deb
    sha:12bd4df126432c253258fe4f93800e456ff8e1bf
  • tomcat9-user_9.0.31-1ubuntu0.9+tuxcare.els3_all.deb
    sha:5c00ff394a1b7e0ee8bedc5e086f9e9f37c46e18
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.