Package: tomcat7 / 7.0.28-4+deb7u4
Metadata
Package | Version | Patches format |
---|---|---|
tomcat7 | 7.0.28-4+deb7u4 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
0001 set UTF 8 as default character encoding.patch | (download) |
conf/server.xml |
1 1 + 0 - 0 ! |
[patch] set utf-8 as default character encoding |
0002 do not load AJP13 connector by default.patch | (download) |
conf/server.xml |
2 2 + 0 - 0 ! |
[patch] do not load ajp13 connector by default |
0003 disable APR library loading.patch | (download) |
conf/server.xml |
2 2 + 0 - 0 ! |
[patch] disable apr library loading ... until we properly provide it. |
0004 split deploy webapps target from deploy target.patch | (download) |
build.xml |
6 5 + 1 - 0 ! |
[patch] split deploy-webapps target from deploy target |
0005 change default DBCP factory class.patch | (download) |
java/org/apache/naming/factory/Constants.java |
2 1 + 1 - 0 ! |
[patch] change default dbcp factory class ... to org.apache.commons.dbcp.BasicDataSourceFactory |
0006 add JARs below var to class loader.patch | (download) |
conf/catalina.properties |
6 3 + 3 - 0 ! |
[patch] add jars below /var to class loader |
0009 Use java.security.policy file in catalina.sh.patch | (download) |
bin/catalina.sh |
6 3 + 3 - 0 ! |
[patch] use java.security.policy file in catalina.sh Make sure catalina.sh uses the Debian/Ubuntu java.security.policy file location when Tomcat is started with a security manager. Bug-Ubuntu: https://bugs.launchpad.net/bugs/591802 Bug-Debian: http://bugs.debian.org/585379 |
0010 debianize build xml.patch | (download) |
build.xml |
4 3 + 1 - 0 ! |
disable usage of embedded library copies |
0011 fix classpath lintian warnings.patch | (download) |
build.xml |
18 8 + 10 - 0 ! |
fix codeless-jar and missing-classpath lintian warnings |
0012 java7 compat.patch | (download) |
modules/jdbc-pool/src/main/java/org/apache/tomcat/jdbc/pool/DataSource.java |
6 5 + 1 - 0 ! |
compatibility patch to support compilation of tomcat7 using openjdk-7 |
0013 dont look for build properties in user home.patch | (download) |
build.xml |
1 0 + 1 - 0 ! |
0013-dont-look-for-build-properties-in-user-home |
cve 2012 3439.patch | (download) |
java/org/apache/catalina/authenticator/DigestAuthenticator.java |
145 84 + 61 - 0 ! |
--- |
cve 2012 3439 tests.patch | (download) |
test/org/apache/catalina/authenticator/TesterDigestAuthenticatorPerformance.java |
40 22 + 18 - 0 ! |
--- |
0016 CVE 2012 4431.patch | (download) |
java/org/apache/catalina/filters/CsrfPreventionFilter.java |
19 13 + 6 - 0 ! |
improve session management in csrfpreventionfilter It is a fix for CVE-2012-4431. |
0017 CVE 2012 3546.patch | (download) |
java/org/apache/catalina/realm/RealmBase.java |
26 0 + 26 - 0 ! |
remove unneeded handling of form authentication in realmbase. The login and error pages are handled via forward, so processing completes before this code is ever reached. The action page is handled elsewhere. It is a fix for CVE-2012-3546. |
0018 CVE 2014 0050.patch | (download) |
java/org/apache/tomcat/util/http/fileupload/FileUploadBase.java |
14 12 + 2 - 0 ! |
fixes an infinite loop caused by invalid mime boundaries |
0019 CVE 2013 2067.patch | (download) |
java/org/apache/catalina/authenticator/FormAuthenticator.java |
10 10 + 0 - 0 ! |
fix for cve-2013-2067: form authentication associates the most recent request requiring authentication with the current session. By repeatedly sending a request for an authenticated resource while the victim is completing the login form, an attacker could inject a request that would be executed using the victim's credentials. |
0020 CVE 2013 2071.patch | (download) |
java/org/apache/catalina/core/AsyncContextImpl.java |
25 17 + 8 - 0 ! |
fix for cve-2013-2071: a runtime exception in asynclistener.oncomplete() prevents the request from being recycled. This may expose elements of a previous request to a current request. |
0021 CVE 2012 3544.patch | (download) |
java/org/apache/coyote/http11/filters/ChunkedInputFilter.java |
75 41 + 34 - 0 ! |
fix for cve-2012-3544: when processing a request submitted using the chunked transfer encoding, Tomcat ignored but did not limit any extensions that were included. This allows a client to perform a limited DOS by streaming an unlimited amount of data to the server. |
0022 update test certificates.patch | (download) |
test/org/apache/tomcat/util/net/TestCustomSsl.java |
2 1 + 1 - 0 ! |
uses updated test certificates to avoid a build failure when the tests are enabled. The updated keystores were taken from Tomcat 7.0.39 (http://svn.apache.org/r1451105) |
0023 CVE 2013 4286.patch | (download) |
java/org/apache/coyote/ajp/AbstractAjpProcessor.java |
15 12 + 3 - 0 ! |
fix for cve-2013-4286: reject requests with multiple content-length headers or with a content-length header when chunked encoding is being used. |
0024 CVE 2013 4322.patch | (download) |
java/org/apache/coyote/http11/AbstractHttp11Processor.java |
5 3 + 2 - 0 ! |
fix for cve-2013-4322: add support for limiting the size of chunk extensions when using chunked encoding |
0025 use tls in ssl unit tests.patch | (download) |
test/org/apache/tomcat/util/net/TesterSupport.java |
10 5 + 5 - 0 ! |
use tls in ssl unit tests |
CVE 2014 7810.patch | (download) |
java/javax/el/BeanELResolver.java |
30 27 + 3 - 0 ! |
cve-2014-7810: fix potential issue with beanelresolver when running under a security manager. Some classes may not be accessible but may have accessible interfaces. |
CVE 2014 0099.patch | (download) |
java/org/apache/tomcat/util/buf/Ascii.java |
18 6 + 12 - 0 ! |
cve-2014-0099: check for overflow when parsing the request content length header. |
CVE 2013 4444.patch | (download) |
java/org/apache/tomcat/util/http/fileupload/FileItem.java |
3 1 + 2 - 0 ! |
cve-2013-4444: remove serialization support from fileitem to prevent a remote code execution vulnerablity in very limited circumstances. |
CVE 2014 0075.patch | (download) |
java/org/apache/coyote/http11/filters/ChunkedInputFilter.java |
12 6 + 6 - 0 ! |
cve-2014-0075: improve processing of chuck size from chunked headers. Avoid overflow and use a bit shift instead of a multiplication as it is marginally faster. |
CVE 2014 0227.patch | (download) |
java/org/apache/coyote/http11/filters/ChunkedInputFilter.java |
58 45 + 13 - 0 ! |
cve-2014-0227: add an error flag in chunkedinputfilter to allow subsequent attempts at reading after an error to fail fast. This prevents remote attackers from conducting HTTP request smuggling attacks or causing a denial of service by streaming data with malformed chunked requests. |
CVE 2014 0230.patch | (download) |
java/org/apache/catalina/connector/mbeans-descriptors.xml |
4 4 + 0 - 0 ! |
cve-2014-0230: add a new limit, defaulting to 2mb and configurable via jmx, for the amount of data Tomcat will swallow for an aborted upload. This prevents remote attackers from causing a denial of service (thread consumption) via a series of aborted upload attempts. |
CVE 2014 0096.patch | (download) |
conf/web.xml |
10 6 + 4 - 0 ! |
cve-2014-0096 java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. |
CVE 2014 0119.patch | (download) |
java/org/apache/catalina/security/SecurityClassLoad.java |
13 13 + 0 - 0 ! |
cve-2014-0119 It was found that in limited circumstances it was possible for a malicious web application to replace the XML parsers used by Tomcat to process XSLTs for the default servlet, JSP documents, tag library descriptors (TLDs) and tag plugin configuration files. The injected XML parser(s) could then bypass the limits imposed on XML external entities and/or have visibility of the XML files processed for other web applications deployed on the same Tomcat instance. |
CVE 2015 5174.patch | (download) |
java/org/apache/tomcat/util/http/RequestUtil.java |
45 29 + 16 - 0 ! |
cve-2015-5174 Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory. |
CVE 2015 5345.patch | (download) |
java/org/apache/catalina/Context.java |
40 40 + 0 - 0 ! |
cve-2015-5345 The Mapper component in Apache Tomcat processes redirects before considering security constraints and Filters, which allows remote attackers to determine the existence of a directory via a URL that lacks a trailing / (slash) character. |
CVE 2015 5346.patch | (download) |
java/org/apache/catalina/connector/CoyoteAdapter.java |
14 8 + 6 - 0 ! |
cve-2015-5346 |
CVE 2015 5351.patch | (download) |
webapps/docs/changelog.xml |
7 7 + 0 - 0 ! |
cve-2015-5351 The Manager and Host Manager applications in Apache Tomcat establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protection mechanism by using a token. |
CVE 2016 0706.patch | (download) |
java/org/apache/catalina/core/RestrictedServlets.properties |
1 1 + 0 - 0 ! |
cve-2016-0706 Apache Tomcat does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application. |
CVE 2016 0714.patch | (download) |
java/org/apache/catalina/ha/session/ClusterManagerBase.java |
2 2 + 0 - 0 ! |
cve-2016-0714 The session-persistence implementation in Apache Tomcat mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session. |
CVE 2016 0763.patch | (download) |
java/org/apache/naming/factory/ResourceLinkFactory.java |
5 5 + 0 - 0 ! |
cve-2016-0763 The setGlobalContext method in org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat does not consider whether ResourceLinkFactory.setGlobalContext callers are authorized, which allows remote authenticated users to bypass intended SecurityManager restrictions and read or write to arbitrary application data, or cause a denial of service (application disruption), via a web application that sets a crafted global context. |