-
tomcat7 (7.0.52-1ubuntu0.16) trusty-security; urgency=medium
* SECURITY UPDATE: arbitrary redirect issue
- debian/patches/CVE-2018-11784.patch: avoid protocol relative
redirects in java/org/apache/catalina/servlets/DefaultServlet.java.
- CVE-2018-11784
-- Marc Deslauriers <email address hidden> Tue, 09 Oct 2018 11:25:36 -0400
-
tomcat7 (7.0.52-1ubuntu0.15) trusty-security; urgency=medium
* SECURITY UPDATE: DoS via issue in UTF-8 decoder
- debian/patches/CVE-2018-1336.patch: fix logic in
java/org/apache/tomcat/util/buf/Utf8Decoder.java.
- CVE-2018-1336
* SECURITY UPDATE: missing hostname verification in WebSocket client
- debian/patches/CVE-2018-8034.patch: enable hostname verification by
default in webapps/docs/web-socket-howto.xml,
java/org/apache/tomcat/websocket/WsWebSocketContainer.java.
- CVE-2018-8034
-- Marc Deslauriers <email address hidden> Wed, 25 Jul 2018 08:27:25 -0400
-
tomcat7 (7.0.52-1ubuntu0.14) trusty-security; urgency=medium
* SECURITY UPDATE: missing checks when HTTP PUTs enabled (LP: #1721749)
- debian/patches/CVE-2017-1261x.patch: add checks to
java/org/apache/catalina/servlets/DefaultServlet.java
java/org/apache/naming/resources/FileDirContext.java,
java/org/apache/naming/resources/JrePlatform.java,
java/org/apache/naming/resources/LocalStrings.properties,
java/org/apache/naming/resources/VirtualDirContext.java,
test/org/apache/naming/resources/TestFileDirContext.java.
- CVE-2017-12616
- CVE-2017-12617
* SECURITY UPDATE: security constraints mapped to context root are ignored
- debian/patches/CVE-2018-1304.patch: add check to
java/org/apache/catalina/realm/RealmBase.java.
- CVE-2018-1304
* SECURITY UPDATE: security constraint annotations applied too late
- debian/patches/CVE-2018-1305.patch: change ordering in
java/org/apache/catalina/Wrapper.java,
java/org/apache/catalina/authenticator/AuthenticatorBase.java,
java/org/apache/catalina/core/ApplicationContext.java,
java/org/apache/catalina/core/ApplicationServletRegistration.java,
java/org/apache/catalina/core/StandardContext.java,
java/org/apache/catalina/core/StandardWrapper.java,
java/org/apache/catalina/startup/ContextConfig.java,
java/org/apache/catalina/startup/Tomcat.java,
java/org/apache/catalina/startup/WebAnnotationSet.java.
- CVE-2018-1305
* SECURITY UPDATE: CORS filter has insecure defaults
- debian/patches/CVE-2018-8014.patch: change defaults in
java/org/apache/catalina/filters/CorsFilter.java,
java/org/apache/catalina/filters/LocalStrings.properties,
test/org/apache/catalina/filters/TestCorsFilter.java,
test/org/apache/catalina/filters/TesterFilterConfigs.java.
- CVE-2018-8014
-- Marc Deslauriers <email address hidden> Tue, 29 May 2018 10:22:42 -0400
-
tomcat7 (7.0.52-1ubuntu0.13) trusty-security; urgency=medium
* SECURITY UPDATE: loss of pipeline requests
- debian/patches/CVE-2017-5647.patch: improve sendfile handling when
requests are pipelined in
java/org/apache/coyote/AbstractProtocol.java,
java/org/apache/coyote/http11/Http11AprProcessor.java,
java/org/apache/coyote/http11/Http11NioProcessor.java,
java/org/apache/tomcat/util/net/AprEndpoint.java,
java/org/apache/tomcat/util/net/NioEndpoint.java,
java/org/apache/tomcat/util/net/SendfileKeepAliveState.java,
java/org/apache/tomcat/util/net/SendfileState.java.
- CVE-2017-5647
* SECURITY UPDATE: incorrect facade object use
- debian/patches/CVE-2017-5648-pre.patch: fix keep-alive with
asynchronous servlet in
java/org/apache/catalina/core/AsyncContextImpl.java,
java/org/apache/coyote/AsyncContextCallback.java,
java/org/apache/coyote/AsyncStateMachine.java,
test/org/apache/catalina/core/TestAsyncContextImpl.java.
- debian/patches/CVE-2017-5648.patch: ensure request and response
facades are used when firing application listeners in
java/org/apache/catalina/authenticator/FormAuthenticator.java,
java/org/apache/catalina/core/StandardHostValve.java.
- CVE-2017-5648
* SECURITY UPDATE: unexpected and undesirable results for static error
pages
- debian/patches/CVE-2017-5664.patch: use a more reliable mechanism in
java/org/apache/catalina/servlets/DefaultServlet.java,
java/org/apache/catalina/servlets/WebdavServlet.java.
- CVE-2017-5664
* SECURITY UPDATE: client and server side cache poisoning in CORS filter
- debian/patches/CVE-2017-7674.patch: set Vary header in response in
java/org/apache/catalina/filters/CorsFilter.java.
- CVE-2017-7674
-- Marc Deslauriers <email address hidden> Wed, 27 Sep 2017 16:28:58 -0400
-
tomcat7 (7.0.52-1ubuntu0.11) trusty; urgency=medium
* Fix an upgrade error when JAVA_OPTS in /etc/default/tomcat7 contains
the '%' character (LP: #1666570).
* Fix javax.servlet.jsp POM to use servlet-api version 3.0 instead of
2.2 (LP: #1664179).
-- Joshua Powers <email address hidden> Wed, 22 Mar 2017 13:42:56 -0600
-
tomcat7 (7.0.52-1ubuntu0.10) trusty-security; urgency=medium
* SECURITY UPDATE: DoS via CPU consumption (LP: #1663318)
- debian/patches/CVE-2017-6056.patch: fix infinite loop in
java/org/apache/coyote/http11/AbstractInputBuffer.java.
- CVE-2017-6056
-- Marc Deslauriers <email address hidden> Fri, 17 Feb 2017 08:51:12 -0500
-
tomcat7 (7.0.52-1ubuntu0.9) trusty-security; urgency=medium
* SECURITY REGRESSION: security manager startup issue (LP: #1659589)
- debian/patches/0009-Use-java.security.policy-file-in-catalina.sh.patch:
update to new /var/lib/tomcat7/policy location.
- debian/tomcat7.postrm.in: remove policy directory.
-- Marc Deslauriers <email address hidden> Wed, 01 Feb 2017 10:40:22 -0500
-
tomcat7 (7.0.52-1ubuntu0.8) trusty-security; urgency=medium
* SECURITY UPDATE: SecurityManager bypass via a utility method
- debian/patches/CVE-2016-5018.patch: remove unnecessary code in
java/org/apache/jasper/compiler/JspRuntimeContext.java,
java/org/apache/jasper/runtime/JspRuntimeLibrary.java,
java/org/apache/jasper/security/SecurityClassLoad.java.
- CVE-2016-5018
* SECURITY UPDATE: mitigaton for httpoxy issue
- debian/patches/CVE-2016-5388.patch: add envHttpHeaders initialization
parameter to conf/web.xml, webapps/docs/cgi-howto.xml,
java/org/apache/catalina/servlets/CGIServlet.java.
- CVE-2016-5388
* SECURITY UPDATE: system properties read SecurityManager bypass
- debian/patches/CVE-2016-6794.patch: extend SecurityManager protection
to the system property replacement feature of the digester in
java/org/apache/catalina/loader/WebappClassLoader.java,
java/org/apache/tomcat/util/digester/Digester.java,
java/org/apache/tomcat/util/security/PermissionCheck.java.
- CVE-2016-6794
* SECURITY UPDATE: SecurityManager bypass via JSP Servlet configuration
parameters
- debian/patches/CVE-2016-6796.patch: ignore some JSP options when
running under a SecurityManager in conf/web.xml,
java/org/apache/jasper/EmbeddedServletOptions.java,
java/org/apache/jasper/resources/LocalStrings.properties,
java/org/apache/jasper/servlet/JspServlet.java,
webapps/docs/jasper-howto.xml.
- CVE-2016-6796
* SECURITY UPDATE: web application global JNDI resource access
- debian/patches/CVE-2016-6797.patch: ensure that the global resource
is only visible via the ResourceLinkFactory when it is meant to be in
java/org/apache/catalina/core/NamingContextListener.java,
java/org/apache/naming/factory/ResourceLinkFactory.java,
test/org/apache/naming/TestNamingContext.java.
- CVE-2016-6797
* SECURITY UPDATE: HTTP response injection via invalid characters
- debian/patches/CVE-2016-6816.patch: add additional checks for valid
characters in java/org/apache/coyote/http11/AbstractInputBuffer.java,
java/org/apache/coyote/http11/AbstractNioInputBuffer.java,
java/org/apache/coyote/http11/InternalAprInputBuffer.java,
java/org/apache/coyote/http11/InternalInputBuffer.java,
java/org/apache/coyote/http11/LocalStrings.properties,
java/org/apache/tomcat/util/http/parser/HttpParser.java.
- CVE-2016-6816
* SECURITY UPDATE: remote code execution via JmxRemoteLifecycleListener
- debian/patches/CVE-2016-8735-pre.patch: remove the restriction that
prevented the use of SSL when specifying a bind address in
java/org/apache/catalina/mbeans/JmxRemoteLifecycleListener.java,
java/org/apache/catalina/mbeans/LocalStrings.properties,
webapps/docs/config/listeners.xml.
- debian/patches/CVE-2016-8735.patch: explicitly configure allowed
credential types in
java/org/apache/catalina/mbeans/JmxRemoteLifecycleListener.java.
- CVE-2016-8735
* SECURITY UPDATE: information leakage between requests
- debian/patches/CVE-2016-8745.patch: properly handle cache when unable
to complete sendfile request in
java/org/apache/tomcat/util/net/NioEndpoint.java.
- CVE-2016-8745
* SECURITY UPDATE: privilege escalation during package upgrade
- debian/rules, debian/tomcat7.postinst: properly set permissions on
/etc/tomcat7/Catalina/localhost.
- CVE-2016-9774
* SECURITY UPDATE: privilege escalation during package removal
- debian/tomcat7.postrm.in: don't reset permissions before removing
user.
- CVE-2016-9775
* debian/tomcat7.init: further hardening.
-- Marc Deslauriers <email address hidden> Thu, 19 Jan 2017 12:38:29 -0500
-
tomcat7 (7.0.52-1ubuntu0.7) trusty-security; urgency=medium
* SECURITY UPDATE: privilege escalation via insecure init script
- debian/tomcat7.init: don't follow symlinks when handling the
catalina.out file.
- CVE-2016-1240
* SECURITY REGRESSION: change in behaviour after security update
(LP: #1609819)
- debian/patches/CVE-2015-5345-2.patch: fix using the new
mapperContextRootRedirectEnabled option in
java/org/apache/catalina/connector/MapperListener.java, change
mapperContextRootRedirectEnabled default to true in
java/org/apache/catalina/core/StandardContext.java,
webapps/docs/config/context.xml. This reverts the change in behaviour
following the CVE-2015-5345 security update and was also done
upstream in later releases.
-- Marc Deslauriers <email address hidden> Fri, 16 Sep 2016 09:19:37 -0400
-
tomcat7 (7.0.52-1ubuntu0.6) trusty-security; urgency=medium
* SECURITY UPDATE: directory traversal vulnerability in RequestUtil.java
- debian/patches/CVE-2015-5174.patch: fix normalization edge cases in
java/org/apache/tomcat/util/http/RequestUtil.java,
test/org/apache/tomcat/util/http/TestRequestUtil.java.
- CVE-2015-5174
* SECURITY UPDATE: information disclosure via redirects by mapper
- debian/patches/CVE-2015-5345.patch: fix redirect logic in
java/org/apache/catalina/Context.java,
java/org/apache/catalina/authenticator/FormAuthenticator.java,
java/org/apache/catalina/core/StandardContext.java,
java/org/apache/catalina/core/mbeans-descriptors.xml,
java/org/apache/catalina/servlets/DefaultServlet.java,
java/org/apache/catalina/servlets/WebdavServlet.java,
java/org/apache/catalina/startup/FailedContext.java,
java/org/apache/tomcat/util/http/mapper/Mapper.java,
test/org/apache/catalina/startup/TomcatBaseTest.java,
webapps/docs/config/context.xml,
test/org/apache/catalina/core/TesterContext.java.
- CVE-2015-5345
* SECURITY UPDATE: session fixation vulnerability
- debian/patches/CVE-2015-5346.patch: handle different session settings
in java/org/apache/catalina/connector/CoyoteAdapter.java,
java/org/apache/catalina/connector/Request.java.
- CVE-2015-5346
* SECURITY UPDATE: CSRF protection mechanism bypass
- debian/patches/CVE-2015-5351.patch: don't create sessions
unnecessarily in webapps/host-manager/WEB-INF/jsp/401.jsp,
webapps/host-manager/WEB-INF/jsp/403.jsp,
webapps/host-manager/WEB-INF/jsp/404.jsp,
webapps/host-manager/index.jsp,
webapps/manager/WEB-INF/web.xml,
webapps/manager/index.jsp.
- CVE-2015-5351
* SECURITY UPDATE: securityManager restrictions bypass via
StatusManagerServlet
- debian/patches/CVE-2016-0706.patch: place servlet in restricted list
in java/org/apache/catalina/core/RestrictedServlets.properties.
- CVE-2016-0706
* SECURITY UPDATE: securityManager restrictions bypass via
session-persistence implementation
- debian/patches/CVE-2016-0714.patch: extend the session attribute
filtering options in
java/org/apache/catalina/ha/session/ClusterManagerBase.java
java/org/apache/catalina/ha/session/mbeans-descriptors.xml,
java/org/apache/catalina/session/LocalStrings.properties,
java/org/apache/catalina/session/ManagerBase.java,
java/org/apache/catalina/session/StandardManager.java,
java/org/apache/catalina/session/mbeans-descriptors.xml,
java/org/apache/catalina/util/CustomObjectInputStream.java,
java/org/apache/catalina/util/LocalStrings.properties,
webapps/docs/config/cluster-manager.xml,
webapps/docs/config/manager.xml.
- CVE-2016-0714
* SECURITY UPDATE: securityManager restrictions bypass via crafted global
context
- debian/patches/CVE-2016-0763.patch: protect initialization in
java/org/apache/naming/factory/ResourceLinkFactory.java.
- CVE-2016-0763
* SECURITY UPDATE: denial of service in FileUpload
- debian/patches/CVE-2016-3092.patch: properly handle size in
java/org/apache/tomcat/util/http/fileupload/MultipartStream.java.
- CVE-2016-3092
* debian/patches/fix_cookie_names_in_tests.patch: fix FTBFS by removing
colons in cookie names which is illegal in newer java versions in
test/org/apache/catalina/authenticator/*.java.
-- Marc Deslauriers <email address hidden> Wed, 29 Jun 2016 12:50:02 -0400
-
tomcat7 (7.0.52-1ubuntu0.3) trusty-security; urgency=medium
* SECURITY UPDATE: arbitrary file disclosure via XML parser
(LP: #1449975)
- debian/patches/CVE-2014-0119.patch: add defensive coding and ensure
TLD parser obtained from cache has correct value of blockExternal in
java/org/apache/catalina/security/SecurityClassLoad.java,
java/org/apache/catalina/servlets/DefaultServlet.java,
java/org/apache/catalina/startup/TldConfig.java,
java/org/apache/jasper/compiler/JspDocumentParser.java,
java/org/apache/jasper/xmlparser/ParserUtils.java,
java/org/apache/tomcat/util/security/PrivilegedGetTccl.java,
java/org/apache/tomcat/util/security/PrivilegedSetTccl.java.
- CVE-2014-0119
* SECURITY UPDATE: HTTP request smuggling or denial of service via
streaming with malformed chunked transfer encoding (LP: #1449975)
- debian/patches/CVE-2014-0227.patch: add error flag and improve i18n
in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java,
java/org/apache/coyote/http11/filters/LocalStrings.properties.
- CVE-2014-0227
* SECURITY UPDATE: denial of service via aborted upload attempts
(LP: #1449975)
- debian/patches/CVE-2014-0230.patch: limit amount of data in
java/org/apache/coyote/http11/AbstractHttp11Processor.java,
java/org/apache/coyote/http11/AbstractHttp11Protocol.java,
java/org/apache/coyote/http11/Http11AprProcessor.java,
java/org/apache/coyote/http11/Http11AprProtocol.java,
java/org/apache/coyote/http11/Http11NioProcessor.java,
java/org/apache/coyote/http11/Http11NioProtocol.java,
java/org/apache/coyote/http11/Http11Processor.java,
java/org/apache/coyote/http11/Http11Protocol.java,
java/org/apache/coyote/http11/filters/ChunkedInputFilter.java,
java/org/apache/coyote/http11/filters/IdentityInputFilter.java,
java/org/apache/coyote/http11/filters/LocalStrings.properties,
test/org/apache/catalina/core/TestSwallowAbortedUploads.java,
webapps/docs/config/http.xml.
- CVE-2014-0230
* SECURITY UPDATE: SecurityManager bypass via Expression Language
- debian/patches/CVE-2014-7810.patch: handle classes that may not be
accessible but have accessible interfaces in
java/javax/el/BeanELResolver.java, remove unnecessary code in
java/org/apache/jasper/runtime/PageContextImpl.java,
java/org/apache/jasper/security/SecurityClassLoad.java.
- CVE-2014-7810
* Replace expired ssl certs and use TLS to fix tests causing FTBFS:
- debian/patches/0022-use-tls-in-ssl-unit-tests.patch
- debian/patches/0023-replace-expired-ssl-certificates.patch
- debian/source/include-binaries
-- Marc Deslauriers <email address hidden> Fri, 19 Jun 2015 12:30:21 -0400
-
tomcat7 (7.0.52-1ubuntu0.1) trusty-security; urgency=medium
* SECURITY UPDATE: denial of service via malformed chunk size
- debian/patches/CVE-2014-0075.patch: fix overflow and added tests to
java/org/apache/coyote/http11/filters/ChunkedInputFilter.java,
test/org/apache/coyote/http11/filters/TestChunkedInputFilter.java.
- CVE-2014-0075
* SECURITY UPDATE: file disclosure via XXE issue
- debian/patches/CVE-2014-0096.patch: change globalXsltFile to be a
relative path in conf/web.xml,
java/org/apache/catalina/servlets/DefaultServlet.java,
java/org/apache/catalina/servlets/LocalStrings.properties,
webapps/docs/default-servlet.xml.
- CVE-2014-0096
* SECURITY UPDATE: HTTP request smuggling attack via crafted
Content-Length HTTP header
- debian/patches/CVE-2014-0099.patch: correctly handle long values in
java/org/apache/tomcat/util/buf/Ascii.java, added test to
test/org/apache/tomcat/util/buf/TestAscii.java.
- CVE-2014-0099
-- Marc Deslauriers <email address hidden> Thu, 24 Jul 2014 13:24:54 -0400
-
tomcat7 (7.0.52-1) unstable; urgency=low
* Team upload.
* New upstream release.
- Addresses security issue: CVE-2014-0050
-- Gianfranco Costamagna <email address hidden> Wed, 19 Feb 2014 14:09:48 +0100
-
tomcat7 (7.0.50-1) unstable; urgency=medium
* New upstream release.
-- James Page <email address hidden> Tue, 14 Jan 2014 18:09:28 +0000
-
tomcat7 (7.0.47-1) unstable; urgency=low
[ Gianfranco Costamagna ]
* Team upload.
* New upstream release, patch refresh.
* Renamed patch fix-manager-webapp.path
to fix-manager-webapp.patch (extension typo).
* Refresh patches for upstream release.
* Removed -Djava.net.preferIPv4Stack=true
from init script (lp: #1088681),
thanks Hendrik Haddorp.
* Added webapp manager path patch (lp: #1128067)
thanks TJ.
[ tony mancill ]
* Bump Standards-Version to 3.9.5.
* Change copyright year in javadocs to 2013.
* Add patch to include the distribution name in error pages.
(Closes: #729840)
-- tony mancill <email address hidden> Tue, 24 Dec 2013 16:46:34 +0000
-
tomcat7 (7.0.42-1) unstable; urgency=low
[ Gianfranco Costamagna ]
* Team upload.
* New upstream release.
* Added libhamcrest-java >= 1.3 as build-dep,
tweaked debian/rules.
* Bumped compat level to 9.
* Removed some version checks, newer releases already in oldstable.
* Refresh patches.
* debian/control: changed Vcs-Git and Vcs-Browser fields,
now they are canonical.
* Fixed error message in Tomcat init script,
patch by Thijs Kinkhorst (Closes: #714348)
-- Gianfranco Costamagna <email address hidden> Tue, 16 Jul 2013 17:34:58 +0200