-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Thu, 28 May 2020 18:08:54 +0200 Source: tomcat8 Binary: tomcat8-common tomcat8 tomcat8-user libtomcat8-java libservlet3.1-java libservlet3.1-java-doc tomcat8-admin tomcat8-examples tomcat8-docs Architecture: source all Version: 8.0.14-1+deb8u17 Distribution: jessie-security Urgency: high Maintainer: Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org> Changed-By: Markus Koschany <apo@debian.org> Description: libservlet3.1-java - Servlet 3.1, JSP 2.3, EL 3.0 and WebSocket 1.0 Java API classes libservlet3.1-java-doc - Servlet 3.1, JSP 2.3, EL 3.0 and WebSocket 1.0 Java API documenta libtomcat8-java - Apache Tomcat 8 - Servlet and JSP engine -- core libraries tomcat8 - Apache Tomcat 8 - Servlet and JSP engine tomcat8-admin - Apache Tomcat 8 - Servlet and JSP engine -- admin web application tomcat8-common - Apache Tomcat 8 - Servlet and JSP engine -- common files tomcat8-docs - Apache Tomcat 8 - Servlet and JSP engine -- documentation tomcat8-examples - Apache Tomcat 8 - Servlet and JSP engine -- example web applicati tomcat8-user - Apache Tomcat 8 - Servlet and JSP engine -- tools to create user Changes: tomcat8 (8.0.14-1+deb8u17) jessie-security; urgency=high . * Non-maintainer upload by the LTS team. . * WARNING: The fix for CVE-2020-1938 may disrupt services that rely on a working AJP configuration. The option secretRequired defaults to true now. You should define a secret in your server.xml or you can revert back by setting secretRequired to false. . * Fix CVE-2019-17563: When using FORM authentication with Apache Tomcat there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability. * Fix CVE-2020-1935: In Apache Tomcat the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely. * Fix CVE-2020-1938: When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. Previously Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. . Note that Debian already disabled the AJP connector by default. Mitigation is only required if the AJP port was made accessible to untrusted users. * Fix CVE-2020-9484: When using Apache Tomcat and an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed. Checksums-Sha1: 91e5cd9b63f82fe51f4808ff7053b9b8ed66215d 3016 tomcat8_8.0.14-1+deb8u17.dsc c84579820bc38c800b4956d41d9e1abaaf55798a 101656 tomcat8_8.0.14-1+deb8u17.debian.tar.xz d76d6fe7e9dc97496639c03648a9bfea5bfed1e2 61012 tomcat8-common_8.0.14-1+deb8u17_all.deb 75be1b7cf4376404470ba31ed4457b7ce1f390e2 50394 tomcat8_8.0.14-1+deb8u17_all.deb 94d11e24d2ee11d575b2b866ec16ed7ff8a9a839 38064 tomcat8-user_8.0.14-1+deb8u17_all.deb cdb45df3d2ed9991c344a5bac9b0e2b32061c2e9 4598210 libtomcat8-java_8.0.14-1+deb8u17_all.deb 0602497377edb609c60c3169925deb3cedbe1a36 395340 libservlet3.1-java_8.0.14-1+deb8u17_all.deb cc8404aa927b523f259110de67aae93ce3d90a3e 251020 libservlet3.1-java-doc_8.0.14-1+deb8u17_all.deb 29702bd6ec07dc0acdc613c2d89ad3a6cebeb503 39266 tomcat8-admin_8.0.14-1+deb8u17_all.deb 4fba576cdb0dc13dcd1d735475bad17555a66668 197352 tomcat8-examples_8.0.14-1+deb8u17_all.deb dc132888e5034e0440ddf4facfb61fb4fe75f201 692626 tomcat8-docs_8.0.14-1+deb8u17_all.deb Checksums-Sha256: a28afbdda9a283bfb422e6ad421d143ffe2ae903d5c6e555d7af1bcfd903995c 3016 tomcat8_8.0.14-1+deb8u17.dsc 28342a708f0f27b5ec3223978aad137b388115890b92af192f4e58ee884daa4b 101656 tomcat8_8.0.14-1+deb8u17.debian.tar.xz c5d1f093e67b8f9791571fb3ca63d20b21f42aac9ab9f4a12d33bddf89ced54f 61012 tomcat8-common_8.0.14-1+deb8u17_all.deb 6a07aec7538327e69c11fe23ede8f8bbc13f896d0ee01c0dc718c86b6fe0ee9b 50394 tomcat8_8.0.14-1+deb8u17_all.deb 61018dffbb1b97e9567c5304aaa2aa3d96c3c4596765c5789cddea7229f633fa 38064 tomcat8-user_8.0.14-1+deb8u17_all.deb b140b2a7a7a5a40cc4492289a278ee9686c1c871a6e9e6c603f5af00864268c4 4598210 libtomcat8-java_8.0.14-1+deb8u17_all.deb 42f67710d351b35bbc5047187c1ce1d11f2564c4e0c52bb6aa33e2281d3e6c3b 395340 libservlet3.1-java_8.0.14-1+deb8u17_all.deb 4a809c513470d0063fb0f66979a10aff5320022b9d261ce95fdd7762ed7f115a 251020 libservlet3.1-java-doc_8.0.14-1+deb8u17_all.deb 27b5b1be3f77ddfcad6d55814b811af8827a8d45572cd12692f99eb0a708da36 39266 tomcat8-admin_8.0.14-1+deb8u17_all.deb adedea16758ff48565209bf2862a387f5869d83868a03198c0b0aa34797e7731 197352 tomcat8-examples_8.0.14-1+deb8u17_all.deb e1c223b5ba20679c74180d3d5e57c83d3ae81061ee8c61af092f401275349588 692626 tomcat8-docs_8.0.14-1+deb8u17_all.deb Files: be6607e79e97a3723390426c37433fa5 3016 java optional tomcat8_8.0.14-1+deb8u17.dsc 98d08f5023ab2b8d1e8a5d6656a20f8e 101656 java optional tomcat8_8.0.14-1+deb8u17.debian.tar.xz 4e71995ed8e518f018246c5705090733 61012 java optional tomcat8-common_8.0.14-1+deb8u17_all.deb 29eaf48908a631f7e64bbb2417ee7280 50394 java optional tomcat8_8.0.14-1+deb8u17_all.deb 28f7eb85a879e7b5a8d9d8195817d6f9 38064 java optional tomcat8-user_8.0.14-1+deb8u17_all.deb 6ce2d7da4425c9c6cd33950d95c44626 4598210 java optional libtomcat8-java_8.0.14-1+deb8u17_all.deb 5d1b67089fd94eba8e8622b0d03710e1 395340 java optional libservlet3.1-java_8.0.14-1+deb8u17_all.deb 8e217b88d759a9ff475d47771ac15b08 251020 doc optional libservlet3.1-java-doc_8.0.14-1+deb8u17_all.deb 6ab4572a74290b639ec7dd7f9b1d24cb 39266 java optional tomcat8-admin_8.0.14-1+deb8u17_all.deb 2328c9b5d489fb49871068f5e969a5fc 197352 java optional tomcat8-examples_8.0.14-1+deb8u17_all.deb acb0c5a72642baf566312d0acd8dd731 692626 doc optional tomcat8-docs_8.0.14-1+deb8u17_all.deb -----BEGIN PGP SIGNATURE----- iQKjBAEBCgCNFiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAl7P6/tfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQPHGFwb0BkZWJp YW4ub3JnAAoJENmtFLlRO1HkxK4QAI938ZI2g/oDdiWe1lbhgrNcaFtTL89gawAo DgFTgoQj4pDVsjCsTpyfjxzsY2vzX45shR7C17E7YJorjNIHyIKyXU6nCzsvzkgX 1fSNcQ+8JmMz6Njz7NnMASFyKYYgw0oFMEwzhN6IKfYeacJtkqNJvYIhfKG27RDe mvVo/VZ7AxC7nRftMzrTitOrDDOrImaXTXtSn0BwWetCsh5DklTJEX+PsiSJiweP Ppl3l+hLCX9lLzdVS45OCSKUkfrfxXOEqKd2E4vlHWhyACkAkgau23sveMLxAET+ Xuz6T1SGl8pYVN3EomNGKL7DPvKG0rRzezkZt6t0PiUH3cMpvonnyNb+A/qCg8ml jiljC9roluQRYfM0d6Gz+FuW8x0gTo4Mwzb2F2go/yilfFyD7mGl/XJuxyuawOYa LpPBpuJ51qxztWCYPATttcIViQL7vC6E4WmAE0XWN3nMBS3KBUA4BxY7/iQXmQgg YDqn1mSuGOZ7o4liS8lKKNvFNnapVWL7//OMNw/uExWGX+CMjRxLqWIIIwaBbivF enRqcSnhK1WmAC0que3uY6kGm2fpI/LaDB1AelqPONEyRPPwMoYh1RiC1IgNgm/O SBMQRtBwBvLO+fIPKDsndeCYsYH1jmrLrRFP8DqBd7fzLBdSJdrcUHIemro7YHam qWmr3hbA =smoz -----END PGP SIGNATURE-----