{"id":"MGASA-2018-0150","summary":"Updated tomcat-native package fixes security vulnerability","details":"When parsing the AIA-Extension field of a client certificate, Apache\nTomcat Native did not correctly handle fields longer than 127 bytes. The\nresult of the parsing error was to skip the OCSP check. It was therefore\npossible for client certificates that should have been rejected (if the\nOCSP check had been made) to be accepted. Users not using OCSP checks\nare not affected by this vulnerability (CVE-2017-15698).\n","modified":"2026-04-16T06:26:25.773422462Z","published":"2018-02-28T13:55:21Z","upstream":["CVE-2017-15698"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2018-0150.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=22568"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/J3AMZRPNW5L27APAWB4IW3SRJQR6HL4G/"}],"affected":[{"package":{"name":"tomcat-native","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/tomcat-native?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2.16-1.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2018-0150.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}