Package "tomcat9-user"
Name: |
tomcat9-user
|
Description: |
Apache Tomcat 9 - Servlet and JSP engine -- tools to create user instances
|
Latest version: |
9.0.31-1ubuntu0.8 |
Release: |
focal (20.04) |
Level: |
security |
Repository: |
universe |
Head package: |
tomcat9 |
Homepage: |
http://tomcat.apache.org |
Links
Download "tomcat9-user"
Other versions of "tomcat9-user" in Focal
Changelog
tomcat9 (9.0.31-1ubuntu0.8) focal-security; urgency=medium
* SECURITY UPDATE: Open redirect
- debian/patches/CVE-2023-41080.patch: Avoid protocol relative
redirects
- CVE-2023-41080
* SECURITY UPDATE: Denial of service
- debian/patches/CVE-2024-23672.patch: Refactor WebSocket close for
suspend/resume
- CVE-2024-23672
* SECURITY UPDATE: Information leak
- debian/patches/CVE-2023-42795.patch: Improve handling of failures
during recycle() methods
- CVE-2023-42795
* SECURITY UPDATE: Request smuggling
- debian/patches/CVE-2023-45648.patch: Align processing of trailer
headers with standard processing
- CVE-2023-45648
* SECURITY UPDATE: Insecure cookie
- debian/patches/CVE-2023-28708.patch: Add secure attribute to
cookie when transmitting over insecure channel
- CVE-2023-28708
-- Bruce Cable <email address hidden> Tue, 05 Nov 2024 16:31:52 +1100
|
Source diff to previous version |
CVE-2023-41080 |
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from |
CVE-2024-23672 |
Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open lea |
CVE-2023-42795 |
Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10 |
CVE-2023-45648 |
Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 thro |
CVE-2023-28708 |
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, sess |
|
tomcat9 (9.0.31-1ubuntu0.7) focal-security; urgency=medium
* SECURITY UPDATE: HTTP request smuggling via invalid header size
- debian/patches/CVE-2023-46589.patch: Ensure IOException on request read
always triggers error handling.
- CVE-2023-46589
-- Octavio Galland <email address hidden> Mon, 23 Sep 2024 09:21:07 -0300
|
Source diff to previous version |
CVE-2023-46589 |
Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 thro |
|
tomcat9 (9.0.31-1ubuntu0.6) focal-security; urgency=medium
* SECURITY UPDATE: Local privilege escalation via FileStore persistent
sessions
- debian/patches/CVE-2022-23181.patch: Make calculation of session storage
location more robust.
- CVE-2022-23181
* SECURITY UPDATE: Denial of service via EncryptInterceptor
- debian/patches/CVE-2022-29885.patch: EncryptInterceptor only provides
partial protection on untrusted network.
- CVE-2022-29885
-- Octavio Galland <email address hidden> Mon, 29 Jul 2024 14:43:06 -0300
|
Source diff to previous version |
CVE-2022-23181 |
The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, |
CVE-2022-29885 |
The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20, 9.0.13 to 9.0.62 and 8.5.38 to 8.5.78 for the EncryptInterceptor in |
|
tomcat9 (9.0.31-1ubuntu0.5) focal-security; urgency=medium
* SECURITY UPDATE: Incorrect handling of requests enables potential smuggling
attack
- debian/patches/CVE-2022-42252.patch: Requests with invalid content-
length should always be rejected
- CVE-2022-42252
-- Bruce Cable <email address hidden> Thu, 04 Jul 2024 09:44:24 +1000
|
Source diff to previous version |
CVE-2022-42252 |
If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26 or 10.1.0-M1 to 10.1.0 was configured to ignore invalid HTTP headers via s |
|
tomcat9 (9.0.31-1ubuntu0.2) focal-security; urgency=medium
* SECURITY UPDATE: TLS Denial of Service
- debian/patches/CVE-2021-41079.patch: Apache Tomcat did not properly
validate incoming TLS packets. When Tomcat was configured to use
NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be
used to trigger an infinite loop resulting in a denial of service.
- CVE-2021-41079
* SECURITY UPDATE: Authentication Vulnerability
- debian/patches/CVE-2021-30640.patch: A vulnerability in the JNDI Realm
of Apache Tomcat allows an attacker to authenticate using variations of
a validc user name and/or to bypass some of the protection provided by
the LockOut Realm.
- CVE-2021-30640
* SECURITY UPDATE: Request Smuggling
- debian/patches/CVE-2021-33037.patch: Apache Tomcat did not correctly
parse the HTTP transfer-encoding request header in some circumstances
leading to the possibility to request smuggling when used with a reverse
proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding
header if the client declared it would only accept an HTTP/1.0 response;
- Tomcat honoured the identify encoding; and - Tomcat did not ensure
that, if present, the chunked encoding was the final encoding.
- CVE-2021-33037
* SECURITY UPDATE: remote code execution via session persistence
- debian/patches/CVE-2021-25329.patch: The fix for CVE-2020-9484 was
incomplete. When using Apache Tomcat with a configuration edge case that
was highly unlikely to be used, the Tomcat instance was still vulnerable
to CVE-2020-9494. Note that both the previously published prerequisites
for CVE-2020-9484 and the previously published mitigations for
CVE-2020-9484 also apply to this issue.
- CVE-2021-25329
* SECURITY UPDATE: Request Header Duplication
- debian/patches/CVE-2021-25122.patch: When responding to new h2c
connection requests, Apache Tomcat could duplicate request headers and a
limited amount of request body from one request to another meaning user
A and user B could both see the results of user A's request.
- CVE-2021-25122
* SECURITY UPDATE: HTTP/2 request header mix-up
- debian/patches/CVE-2020-17527.patch: HTTP/2 It was discovered that
Apache Tomcat could re-use an HTTP request header value from the previous
stream received on an HTTP/2 connection for the request associated with
the subsequent stream. While this would most likely lead to an error and
the closure of the HTTP/2 connection, it is possible that information
could leak between requests.
- CVE-2020-17527
* SECURITY UPDATE: HTTP/2 request mix-up
- debian/patches/CVE-2020-13943.patch: If an HTTP/2 client exceeded the
agreed maximum number of concurrent streams for a connection (in
violation of the HTTP/2 protocol), it was possible that a subsequent
request made on that connection could contain HTTP headers - including
HTTP/2 pseudo headers - from a previous request rather than the intended
headers. This could lead to users seeing responses for unexpected
resources.
- CVE-2020-13943
-- Evren Yurtesen <email address hidden> Wed, 16 Mar 2022 20:51:24 +0200
|
CVE-2021-41079 |
Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured |
CVE-2021-30640 |
A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of |
CVE-2021-33037 |
Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some c |
CVE-2021-25329 |
The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with |
CVE-2020-9484 |
When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to contr |
CVE-2020-9494 |
Apache Traffic Server 6.0.0 to 6.2.3, 7.0.0 to 7.1.10, and 8.0.0 to 8.0.7 is vulnerable to certain types of HTTP/2 HEADERS frames that can cause the |
CVE-2021-25122 |
When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate re |
CVE-2020-17527 |
While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTT |
CVE-2020-13943 |
If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of c |
|
About
-
Send Feedback to @ubuntu_updates