{"id":"USN-7410-1","summary":"tomcat9 vulnerability","details":"It was discovered that Tomcat incorrectly handled request cancellation. A\nremote attacker could possibly use this issue to cause tomcat9 to consume\nresources, leading to a denial of service.\n","modified":"2026-04-27T17:52:38.575018Z","published":"2025-04-07T09:18:55Z","related":["UBUNTU-CVE-2023-44487"],"upstream":["CVE-2023-44487","UBUNTU-CVE-2023-44487"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7410-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-44487"}],"affected":[{"package":{"name":"tomcat9","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/tomcat9@9.0.16-3ubuntu0.18.04.2+esm5?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.0.16-3ubuntu0.18.04.2+esm5"}]}],"versions":["9.0.16-3~18.04.1","9.0.16-3ubuntu0.18.04.1","9.0.16-3ubuntu0.18.04.2","9.0.16-3ubuntu0.18.04.2+esm1","9.0.16-3ubuntu0.18.04.2+esm2","9.0.16-3ubuntu0.18.04.2+esm3","9.0.16-3ubuntu0.18.04.2+esm4"],"ecosystem_specific":{"binaries":[{"binary_version":"9.0.16-3ubuntu0.18.04.2+esm5","binary_name":"libtomcat9-embed-java"},{"binary_version":"9.0.16-3ubuntu0.18.04.2+esm5","binary_name":"libtomcat9-java"},{"binary_version":"9.0.16-3ubuntu0.18.04.2+esm5","binary_name":"tomcat9"},{"binary_version":"9.0.16-3ubuntu0.18.04.2+esm5","binary_name":"tomcat9-admin"},{"binary_version":"9.0.16-3ubuntu0.18.04.2+esm5","binary_name":"tomcat9-common"},{"binary_version":"9.0.16-3ubuntu0.18.04.2+esm5","binary_name":"tomcat9-docs"},{"binary_version":"9.0.16-3ubuntu0.18.04.2+esm5","binary_name":"tomcat9-examples"},{"binary_version":"9.0.16-3ubuntu0.18.04.2+esm5","binary_name":"tomcat9-user"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2023-44487"}],"ecosystem":"Ubuntu:Pro:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7410-1.json"}},{"package":{"name":"tomcat9","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/tomcat9@9.0.31-1ubuntu0.9?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.0.31-1ubuntu0.9"}]}],"versions":["9.0.24-1","9.0.27-1","9.0.31-1","9.0.31-1ubuntu0.1","9.0.31-1ubuntu0.2","9.0.31-1ubuntu0.3","9.0.31-1ubuntu0.4","9.0.31-1ubuntu0.5","9.0.31-1ubuntu0.6","9.0.31-1ubuntu0.7","9.0.31-1ubuntu0.8"],"ecosystem_specific":{"binaries":[{"binary_version":"9.0.31-1ubuntu0.9","binary_name":"libtomcat9-embed-java"},{"binary_version":"9.0.31-1ubuntu0.9","binary_name":"libtomcat9-java"},{"binary_version":"9.0.31-1ubuntu0.9","binary_name":"tomcat9"},{"binary_version":"9.0.31-1ubuntu0.9","binary_name":"tomcat9-admin"},{"binary_version":"9.0.31-1ubuntu0.9","binary_name":"tomcat9-common"},{"binary_version":"9.0.31-1ubuntu0.9","binary_name":"tomcat9-docs"},{"binary_version":"9.0.31-1ubuntu0.9","binary_name":"tomcat9-examples"},{"binary_version":"9.0.31-1ubuntu0.9","binary_name":"tomcat9-user"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2023-44487"}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7410-1.json"}},{"package":{"name":"tomcat9","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/tomcat9@9.0.58-1ubuntu0.2?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.0.58-1ubuntu0.2"}]}],"versions":["9.0.43-3","9.0.54-1","9.0.55-1","9.0.58-1","9.0.58-1ubuntu0.1"],"ecosystem_specific":{"binaries":[{"binary_version":"9.0.58-1ubuntu0.2","binary_name":"libtomcat9-embed-java"},{"binary_version":"9.0.58-1ubuntu0.2","binary_name":"libtomcat9-java"},{"binary_version":"9.0.58-1ubuntu0.2","binary_name":"tomcat9"},{"binary_version":"9.0.58-1ubuntu0.2","binary_name":"tomcat9-admin"},{"binary_version":"9.0.58-1ubuntu0.2","binary_name":"tomcat9-common"},{"binary_version":"9.0.58-1ubuntu0.2","binary_name":"tomcat9-docs"},{"binary_version":"9.0.58-1ubuntu0.2","binary_name":"tomcat9-examples"},{"binary_version":"9.0.58-1ubuntu0.2","binary_name":"tomcat9-user"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2023-44487"}],"ecosystem":"Ubuntu:22.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7410-1.json"}}],"schema_version":"1.7.5"}