[ubuntu/xenial-security] tomcat7 7.0.68-1ubuntu0.3 (Accepted)
Eduardo dos Santos Barretto
eduardo.barretto at canonical.com
Wed Oct 24 20:52:42 UTC 2018
tomcat7 (7.0.68-1ubuntu0.3) xenial-security; urgency=medium
* SECURITY UPDATE: Timing attack can determine valid user names.
- debian/patches/CVE-2016-0762.patch: fix in the Realm
implementation.
- CVE-2016-0762
* SECURITY UPDATE: privilege escalation via insecure init script
- debian/tomcat7.init: don't follow symlinks when handling the
catalina.out file.
- CVE-2016-1240
* SECURITY UPDATE: SecurityManager bypass via a utility method.
- debian/patches/CVE-2016-5018.patch: remove unnecessary code in
java/org/apache/jasper/compiler/JspRuntimeContext.java,
java/org/apache/jasper/runtime/JspRuntimeLibrary.java,
java/org/apache/jasper/security/SecurityClassLoad.java.
- debian/patches/CVE-2016-5018-part2.patch: fix a regression when
using Jasper with SecurityManager enabled.
- CVE-2016-5018
* SECURITY UPDATE: system properties read SecurityManager bypass
- debian/patches/CVE-2016-6794.patch: extend SecurityManager
protection to the system property replacement feature of the
digester in java/org/apache/catalina/loader/WebappClassLoader.java,
java/org/apache/tomcat/util/digester/Digester.java,
java/org/apache/tomcat/util/security/PermissionCheck.java.
- CVE-2016-6794
* SECURITY UPDATE: SecurityManager bypass via JSP Servlet configuration
parameters.
- debian/patches/CVE-2016-6796.patch: ignore some JSP options when
running under a SecurityManager in conf/web.xml,
java/org/apache/jasper/EmbeddedServletOptions.java,
java/org/apache/jasper/resources/LocalStrings.properties,
java/org/apache/jasper/servlet/JspServlet.java,
webapps/docs/jasper-howto.xml.
- CVE-2016-6796
* SECURITY UPDATE: web application global JNDI resource access
- debian/patches/CVE-2016-6797.patch: ensure that the global resource
is only visible via the ResourceLinkFactory when it is meant to be
in java/org/apache/catalina/core/NamingContextListener.java,
java/org/apache/naming/factory/ResourceLinkFactory.java,
test/org/apache/naming/TestNamingContext.java.
- CVE-2016-6797
* SECURITY UPDATE: HTTP response injection via invalid characters
- debian/patches/CVE-2016-6816.patch: add additional checks for valid
characters in
java/org/apache/coyote/http11/AbstractInputBuffer.java,
java/org/apache/coyote/http11/AbstractNioInputBuffer.java,
java/org/apache/coyote/http11/InternalAprInputBuffer.java,
java/org/apache/coyote/http11/InternalInputBuffer.java,
java/org/apache/coyote/http11/LocalStrings.properties,
java/org/apache/tomcat/util/http/parser/HttpParser.java.
- CVE-2016-6816
* SECURITY UPDATE: remote code execution via JmxRemoteLifecycleListener
- debian/patches/CVE-2016-8735.patch: explicitly configure allowed
credential types in
java/org/apache/catalina/mbeans/JmxRemoteLifecycleListener.java.
- CVE-2016-8735
* SECURITY UPDATE: information leakage between requests
- debian/patches/CVE-2016-8745.patch: properly handle cache when
unable to complete sendfile request in
java/org/apache/tomcat/util/net/NioEndpoint.java.
- CVE-2016-8745
* SECURITY UPDATE: privilege escalation during package upgrade
- debian/rules, debian/tomcat7.postinst: properly set permissions on
/etc/tomcat7/Catalina/localhost.
- CVE-2016-9774
* SECURITY UPDATE: privilege escalation during package removal
- debian/tomcat7.postrm.in: don't reset permissions before removing
user.
- CVE-2016-9775
* debian/tomcat7.init: further hardening.
Date: 2018-10-24 19:24:15.823240+00:00
Changed-By: Eduardo dos Santos Barretto <eduardo.barretto at canonical.com>
https://launchpad.net/ubuntu/+source/tomcat7/7.0.68-1ubuntu0.3
-------------- next part --------------
Sorry, changesfile not available.
More information about the Xenial-changes
mailing list