Back to tomcat7 PTS page

Accepted tomcat7 7.0.56-3+really7.0.100-1 (source all) into oldoldstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 04 Mar 2020 12:33:23 +0100
Source: tomcat7
Binary: tomcat7-common tomcat7 tomcat7-user libtomcat7-java libservlet3.0-java libservlet3.0-java-doc tomcat7-admin tomcat7-examples tomcat7-docs
Architecture: source all
Version: 7.0.56-3+really7.0.100-1
Distribution: jessie-security
Urgency: high
Maintainer: Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>
Changed-By: Markus Koschany <apo@debian.org>
Description:
 libservlet3.0-java - Servlet 3.0 and JSP 2.2 Java API classes
 libservlet3.0-java-doc - Servlet 3.0 and JSP 2.2 Java API documentation
 libtomcat7-java - Servlet and JSP engine -- core libraries
 tomcat7    - Servlet and JSP engine
 tomcat7-admin - Servlet and JSP engine -- admin web applications
 tomcat7-common - Servlet and JSP engine -- common files
 tomcat7-docs - Servlet and JSP engine -- documentation
 tomcat7-examples - Servlet and JSP engine -- example web applications
 tomcat7-user - Servlet and JSP engine -- tools to create user instances
Changes:
 tomcat7 (7.0.56-3+really7.0.100-1) jessie-security; urgency=high
 .
   * New upstream version 7.0.56-3+really7.0.100.
   * Fix CVE-2019-17569: HTTP Request Smuggling
     The refactoring in 7.0.98 introduced a regression. The result of the
     regression was that invalid Transfer-Encoding headers were incorrectly
     processed leading to a possibility of HTTP Request Smuggling if Tomcat was
     located behind a reverse proxy that incorrectly handled the invalid
     Transfer-Encoding header in a particular manner. Such a reverse proxy is
     considered unlikely.
   * Fix CVE-2020-1935: HTTP Request Smuggling
     The HTTP header parsing code used an approach to end-of-line (EOL) parsing
     that allowed some invalid HTTP headers to be parsed as valid. This led to a
     possibility of HTTP Request Smuggling if Tomcat was located behind a
     reverse proxy that incorrectly handled the invalid Transfer-Encoding header
     in a particular manner. Such a reverse proxy is considered unlikely.
   * Fix CVE-2020-1936: AJP Request Injection and potential Remote Code Execution
     When using the Apache JServ Protocol (AJP), care must be taken when
     trusting incoming connections to Apache Tomcat. Tomcat treats AJP
     connections as having higher trust than, for example, a similar HTTP
     connection. If such connections are available to an attacker, they can be
     exploited in ways that may be surprising. Prior to Tomcat 7.0.100, Tomcat
     shipped with an AJP Connector enabled by default that listened on all
     configured IP addresses. It was expected (and recommended in the security
     guide) that this Connector would be disabled if not required.
     .
     Note that Debian already disabled the AJP connector by default. Mitigation
     is only required if the AJP port was made accessible to untrusted users.
Checksums-Sha1:
 9236d30e67b87ee5d6621d4616193127506f7635 3033 tomcat7_7.0.56-3+really7.0.100-1.dsc
 d699b8e107cee9ece80f051cc4cbc521ba49ffa7 3426752 tomcat7_7.0.56-3+really7.0.100.orig.tar.xz
 c1895fb4087d128bd7f7a63a15eb2de9c7cdb226 53576 tomcat7_7.0.56-3+really7.0.100-1.debian.tar.xz
 87d351e7a8c95a6514bade5d7aeda4740d5e48c7 300002 tomcat7-common_7.0.56-3+really7.0.100-1_all.deb
 8578578469b3f3051d73ba5629e3f23d0529b9ca 56482 tomcat7_7.0.56-3+really7.0.100-1_all.deb
 0cd4dfce2893436391d0310beec4b157ae94ae92 44056 tomcat7-user_7.0.56-3+really7.0.100-1_all.deb
 b1b65d69f568fad5d7fd019e8f44680cabcc51cc 4028254 libtomcat7-java_7.0.56-3+really7.0.100-1_all.deb
 1318ae5f3e362a5a7fb73a22920bfb11cdafbf05 319176 libservlet3.0-java_7.0.56-3+really7.0.100-1_all.deb
 9bc3e0497ef76889a9e177b4eaef5279259f0760 212028 libservlet3.0-java-doc_7.0.56-3+really7.0.100-1_all.deb
 ffefdb01180a85f40f3c03a26db6a30f7711d053 40128 tomcat7-admin_7.0.56-3+really7.0.100-1_all.deb
 7d4815a380b7f4609650a6aa50a0e9dd2af13e12 203604 tomcat7-examples_7.0.56-3+really7.0.100-1_all.deb
 fef25e4bdd96955d1e2c3cd35307068ebaced002 703952 tomcat7-docs_7.0.56-3+really7.0.100-1_all.deb
Checksums-Sha256:
 456d0a791b0cbe0701da986e6eea398b8af56e536a6779a90fc5f0027729aee4 3033 tomcat7_7.0.56-3+really7.0.100-1.dsc
 74f261e8b5f5644865e8044e56826779e53227a5fea05c444b8bdaeb2310752d 3426752 tomcat7_7.0.56-3+really7.0.100.orig.tar.xz
 e1fa951a449c5af52d3ec42044a29391b9e6b0cd45e6c0c1586bb364ac50a4df 53576 tomcat7_7.0.56-3+really7.0.100-1.debian.tar.xz
 c00e377f83ca7ac9741141f779b297f59f442a1ad77eefd9087de062fb86ad00 300002 tomcat7-common_7.0.56-3+really7.0.100-1_all.deb
 fa8d3ca26e68f29765cad5c999d6cb0a3e4df9d49f7638a22f4c68db9121959b 56482 tomcat7_7.0.56-3+really7.0.100-1_all.deb
 fdf1217385512d024628aaf895759008ee05671fc61fcac094a55db7e7ccee37 44056 tomcat7-user_7.0.56-3+really7.0.100-1_all.deb
 a747926dea1c4566355b1a1f1baa923984ccdf022a325fff35553a3dc280ca90 4028254 libtomcat7-java_7.0.56-3+really7.0.100-1_all.deb
 493b164bb16d43258b0284a33acb84e8ee8846d0044ebdeb3c1be1aa2e752a75 319176 libservlet3.0-java_7.0.56-3+really7.0.100-1_all.deb
 35a5fcc72d6312c0c2c41c8549d5a563189864f4751d9492d9b16693834a213a 212028 libservlet3.0-java-doc_7.0.56-3+really7.0.100-1_all.deb
 553e8122e310760869587425bd52a9c6f63e4224480933b5a88f5c95aa26e989 40128 tomcat7-admin_7.0.56-3+really7.0.100-1_all.deb
 4dce50380d7e9ba898facc4e9eb09f4eac9750bb9d8d266557b7215a0b45a459 203604 tomcat7-examples_7.0.56-3+really7.0.100-1_all.deb
 c048987e44fdd2ba02ffb235d4cff700f0688319bdfc5060c7c9603760702b4a 703952 tomcat7-docs_7.0.56-3+really7.0.100-1_all.deb
Files:
 373ddc039b47d44f651cfd02efdb6012 3033 java optional tomcat7_7.0.56-3+really7.0.100-1.dsc
 0efc258afb43cbb86cbb808956fc8121 3426752 java optional tomcat7_7.0.56-3+really7.0.100.orig.tar.xz
 175ab595a796164b8db346d2b499bc95 53576 java optional tomcat7_7.0.56-3+really7.0.100-1.debian.tar.xz
 418a749078aca47286ad831cd46893f0 300002 java optional tomcat7-common_7.0.56-3+really7.0.100-1_all.deb
 a89811c4de84a2630da68ed5742e4e1a 56482 java optional tomcat7_7.0.56-3+really7.0.100-1_all.deb
 116341be7e3ff7627c92a7b9dd40c4bd 44056 java optional tomcat7-user_7.0.56-3+really7.0.100-1_all.deb
 6bb5219356c824ceedb421915f313740 4028254 java optional libtomcat7-java_7.0.56-3+really7.0.100-1_all.deb
 13439864a1c0496b9b50da959ed6bf7c 319176 java optional libservlet3.0-java_7.0.56-3+really7.0.100-1_all.deb
 3f489757b47af5bb91331aa56de4e91d 212028 doc optional libservlet3.0-java-doc_7.0.56-3+really7.0.100-1_all.deb
 149e004a3eab51cc0a40a7ec3f7a2e0a 40128 java optional tomcat7-admin_7.0.56-3+really7.0.100-1_all.deb
 485113675e4115023eea637c5e174c99 203604 java optional tomcat7-examples_7.0.56-3+really7.0.100-1_all.deb
 9daa513217000a4d99465df14a7a6a17 703952 doc optional tomcat7-docs_7.0.56-3+really7.0.100-1_all.deb

-----BEGIN PGP SIGNATURE-----
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=Iq9C
-----END PGP SIGNATURE-----