Package: tomcat7 / 7.0.56-3+deb8u11
Metadata
Package | Version | Patches format |
---|---|---|
tomcat7 | 7.0.56-3+deb8u11 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
0001 set UTF 8 as default character encoding.patch | (download) |
conf/server.xml |
1 1 + 0 - 0 ! |
[patch] set utf-8 as default character encoding |
0002 do not load AJP13 connector by default.patch | (download) |
conf/server.xml |
2 2 + 0 - 0 ! |
[patch] do not load ajp13 connector by default |
0003 disable APR library loading.patch | (download) |
conf/server.xml |
2 2 + 0 - 0 ! |
[patch] disable apr library loading ... until we properly provide it. |
0004 split deploy webapps target from deploy target.patch | (download) |
build.xml |
6 5 + 1 - 0 ! |
[patch] split deploy-webapps target from deploy target |
0005 skip test failures.patch | (download) |
build.xml |
2 1 + 1 - 0 ! |
print only the summary of the tests |
0006 add JARs below var to class loader.patch | (download) |
conf/catalina.properties |
6 3 + 3 - 0 ! |
[patch] add jars below /var to class loader |
0009 Use java.security.policy file in catalina.sh.patch | (download) |
bin/catalina.sh |
6 3 + 3 - 0 ! |
[patch] use java.security.policy file in catalina.sh Make sure catalina.sh uses the Debian/Ubuntu java.security.policy file location when Tomcat is started with a security manager. Bug-Ubuntu: https://bugs.launchpad.net/bugs/591802 Bug-Debian: http://bugs.debian.org/585379 |
0010 debianize build xml.patch | (download) |
build.xml |
4 3 + 1 - 0 ! |
disable usage of embedded library copies |
0011 fix classpath lintian warnings.patch | (download) |
build.xml |
18 8 + 10 - 0 ! |
fix codeless-jar and missing-classpath lintian warnings |
0012 java7 compat.patch | (download) |
modules/jdbc-pool/src/main/java/org/apache/tomcat/jdbc/pool/DataSource.java |
6 5 + 1 - 0 ! |
compatibility patch to support compilation of tomcat7 using openjdk-7 |
0013 dont look for build properties in user home.patch | (download) |
build.xml |
1 0 + 1 - 0 ! |
0013-dont-look-for-build-properties-in-user-home |
0014 JDTCompiler.patch | (download) |
java/org/apache/jasper/compiler/JDTCompiler.java |
2 1 + 1 - 0 ! |
--- |
0015_disable_test_TestCometProcessor.patch | (download) |
test/org/apache/catalina/comet/TestCometProcessor.java |
3 2 + 1 - 0 ! |
--- |
0017 use jdbc pool default.patch | (download) |
java/org/apache/naming/factory/Constants.java |
2 1 + 1 - 0 ! |
make jdbc-pool module default Tomcat upstream ships a patched version of Commons DBCP. This is not shipped in the Debian packages. . It also provides an alternative, lightweight pool implementation which is shipped. . This patch makes this implementation the default pool. |
0018 fix manager webapp.patch | (download) |
conf/catalina.policy |
4 2 + 2 - 0 ! |
this patch changes the manager path from webapps/manager to ../tomcat7-admin/manager |
0019 add distribution to error page.patch | (download) |
build.xml |
1 1 + 0 - 0 ! |
--- |
0020 disable java8 support with jdtcompiler.patch | (download) |
java/org/apache/jasper/compiler/JDTCompiler.java |
8 0 + 8 - 0 ! |
drop java 8 support in jsp files until the eclipse compiler is updated |
0021 add simple instance manager.patch | (download) |
java/org/apache/tomcat/SimpleInstanceManager.java |
68 68 + 0 - 0 ! |
add the simpleinstancemanager class from tomcat 8 to help integrating the jsp compiler into jetty 8 |
0022 use tls in ssl unit tests.patch | (download) |
test/org/apache/tomcat/util/net/TesterSupport.java |
10 5 + 5 - 0 ! |
use tls in ssl unit tests |
0023 update test certificates.patch | (download) |
test/org/apache/tomcat/util/net/TestCustomSsl.java |
2 1 + 1 - 0 ! |
uses updated test certificates to avoid a build failure when the tests are enabled. The updated keystores were taken from Tomcat 7.0.39 (http://svn.apache.org/r1451105) |
0024 disable unit tests depending on network access.path | (download) |
test/org/apache/catalina/session/TestStandardSession.java |
3 2 + 1 - 0 ! |
disable unit tests that depends on network access After fixing a FTBFS bug (#789519), I noticed this package kept failing to build due to some failing test when is built in an environment without network access. tomcat7 (7.0.56-2) unstable; urgency=medium |
fix TestNonLoginAndBasicAuthenticator.patch | (download) |
test/org/apache/catalina/authenticator/TestNonLoginAndBasicAuthenticator.java |
6 3 + 3 - 0 ! |
don't add ":" to cookie name. it is illegal in newer jres |
CVE 2014 7810.patch | (download) |
java/javax/el/BeanELResolver.java |
30 27 + 3 - 0 ! |
cve-2014-7810: fix potential issue with beanelresolver when running under a security manager. Some classes may not be accessible but may have accessible interfaces. |
CVE 2015 5174.patch | (download) |
java/org/apache/tomcat/util/http/RequestUtil.java |
45 29 + 16 - 0 ! |
cve-2015-5174 Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory. |
CVE 2015 5346.patch | (download) |
java/org/apache/catalina/connector/CoyoteAdapter.java |
1 1 + 0 - 0 ! |
cve-2015-5346 |
CVE 2015 5345.patch | (download) |
java/org/apache/catalina/Context.java |
40 40 + 0 - 0 ! |
cve-2015-5345 The Mapper component in Apache Tomcat processes redirects before considering security constraints and Filters, which allows remote attackers to determine the existence of a directory via a URL that lacks a trailing / (slash) character. http://svn.apache.org/viewvc?view=revision&revision=1715213 http://svn.apache.org/viewvc?view=revision&revision=1716860 http://svn.apache.org/viewvc?view=revision&revision=1717210 http://svn.apache.org/viewvc?view=revision&revision=1717212 |
CVE 2015 5351.patch | (download) |
webapps/docs/changelog.xml |
7 7 + 0 - 0 ! |
cve-2015-5351 The Manager and Host Manager applications in Apache Tomcat establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protection mechanism by using a token. |
CVE 2016 0706.patch | (download) |
java/org/apache/catalina/core/RestrictedServlets.properties |
1 1 + 0 - 0 ! |
cve-2016-0706 Apache Tomcat does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application. |
CVE 2016 0714.patch | (download) |
java/org/apache/catalina/ha/session/ClusterManagerBase.java |
2 2 + 0 - 0 ! |
cve-2016-0714 The session-persistence implementation in Apache Tomcat mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session. |
CVE 2016 0762.patch | (download) |
java/org/apache/catalina/realm/MemoryRealm.java |
3 3 + 0 - 0 ! |
fixes cve-2016-0762: the realm implementations did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. |
CVE 2016 0763.patch | (download) |
java/org/apache/naming/factory/ResourceLinkFactory.java |
5 5 + 0 - 0 ! |
cve-2016-0763 The setGlobalContext method in org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat does not consider whether ResourceLinkFactory.setGlobalContext callers are authorized, which allows remote authenticated users to bypass intended SecurityManager restrictions and read or write to arbitrary application data, or cause a denial of service (application disruption), via a web application that sets a crafted global context. |
CVE 2016 3092.patch | (download) |
java/org/apache/tomcat/util/http/fileupload/MultipartStream.java |
11 6 + 5 - 0 ! |
fixes cve-2016-3092: denial-of-service vulnerability |
CVE 2016 5018.patch | (download) |
java/org/apache/jasper/compiler/JspRuntimeContext.java |
2 0 + 2 - 0 ! |
fixes cve-2016-5018: a malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications. |
CVE 2016 6794.patch | (download) |
java/org/apache/catalina/loader/WebappClassLoader.java |
24 23 + 1 - 0 ! |
fixes cve-2016-6794: when a securitymanager is configured, a web application's ability to read system properties should be controlled by the SecurityManager. Tomcat's system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible. |
CVE 2016 6796.patch | (download) |
conf/web.xml |
4 4 + 0 - 0 ! |
fixes cve-2016-6796: a malicious web application was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet. |
CVE 2016 6797.patch | (download) |
java/org/apache/catalina/core/NamingContextListener.java |
19 19 + 0 - 0 ! |
fixes cve-2016-6797: the resourcelinkfactory did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not. |
CVE 2016 6816.patch | (download) |
java/org/apache/coyote/http11/AbstractInputBuffer.java |
53 0 + 53 - 0 ! |
fixes cve-2016-6816: the code that parsed the http request line permitted invalid characters. This could be exploited, in conjunction with |
BZ 57377.patch | (download) |
java/org/apache/catalina/mbeans/JmxRemoteLifecycleListener.java |
227 160 + 67 - 0 ! |
remove the restriction that prevented the use of ssl when specifying a bind address for the JMX/RMI server. Enable SSL to be configured for the registry as well as the server. |
CVE 2016 8735.patch | (download) |
java/org/apache/catalina/mbeans/JmxRemoteLifecycleListener.java |
6 5 + 1 - 0 ! |
fixes cve-2016-8735: the jmxremotelifecyclelistener was not updated to take account of Oracle's fix for CVE-2016-3427. Therefore, Tomcat installations using this listener remained vulnerable to a similar remote code execution vulnerability. This issue has been rated as important rather than critical due to the small number of installations using this listener and that it would be highly unusual for the JMX ports to be accessible to an attacker even when the listener is used. |
CVE 2016 8745.patch | (download) |
java/org/apache/tomcat/util/net/NioEndpoint.java |
7 6 + 1 - 0 ! |
fixes: cve-2016-8745: when unable to complete sendfile request, ensure the Processor will be added to the cache only once. This bug in the error handling of the send file code for the NIO HTTP connector resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. |
BZ57544 infinite loop.patch | (download) |
java/org/apache/coyote/http11/AbstractInputBuffer.java |
16 4 + 12 - 0 ! |
bz57544 infinite loop Bug-Upstream: https://bz.apache.org/bugzilla/show_bug.cgi?id=60578 Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854551 |
BZ57544 infinite loop part2.patch | (download) |
java/org/apache/coyote/http11/AbstractInputBuffer.java |
5 3 + 2 - 0 ! |
bz57544-infinite-loop-part2 Fix 400 HTTP errors due to an incomplete fix for CVE-2017-6056. Bug-Debian: https://bugs.debian.org/854551 |
CVE 2017 5647.patch | (download) |
java/org/apache/coyote/AbstractProtocol.java |
7 3 + 4 - 0 ! |
cve-2017-5647 Bug-Debian: https://bugs.debian.org/860068 |
CVE 2017 5648.patch | (download) |
java/org/apache/catalina/authenticator/FormAuthenticator.java |
11 5 + 6 - 0 ! |
cve-2017-5648 Bug-Debian: https://bugs.debian.org/860068 |
CVE 2017 5664.patch | (download) |
java/org/apache/catalina/servlets/DefaultServlet.java |
28 21 + 7 - 0 ! |
cve-2017-5664 |