[tomcat8] 01/01: Fixed CVE-2016-8745: Information Disclosure

Emmanuel Bourg ebourg-guest at moszumanska.debian.org
Thu Jan 5 16:27:32 UTC 2017


This is an automated email from the git hooks/post-receive script.

ebourg-guest pushed a commit to branch jessie
in repository tomcat8.

commit d866c5f0d7863aa0b46ba544c18b0fdf6fa62d91
Author: Emmanuel Bourg <ebourg at apache.org>
Date:   Thu Jan 5 17:14:46 2017 +0100

    Fixed CVE-2016-8745: Information Disclosure
---
 debian/changelog                   | 11 +++++++++++
 debian/patches/CVE-2016-8745.patch | 30 ++++++++++++++++++++++++++++++
 debian/patches/series              |  1 +
 3 files changed, 42 insertions(+)

diff --git a/debian/changelog b/debian/changelog
index a7b38c2..34fb2d6 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,14 @@
+tomcat8 (8.0.14-1+deb8u6) jessie-security; urgency=high
+
+  * Fixed CVE-2016-8745: A bug in the error handling of the send file code for
+    the NIO HTTP connector resulted in the current Processor object being added
+    to the Processor cache multiple times. This in turn meant that the same
+    Processor could be used for concurrent requests. Sharing a Processor can
+    result in information leakage between requests including, not not limited
+    to, session ID and the response body.
+
+ -- Emmanuel Bourg <ebourg at apache.org>  Thu, 05 Jan 2017 17:10:29 +0100
+
 tomcat8 (8.0.14-1+deb8u5) jessie-security; urgency=high
 
   * Fixed CVE-2016-9774: Potential privilege escalation when the tomcat8
diff --git a/debian/patches/CVE-2016-8745.patch b/debian/patches/CVE-2016-8745.patch
new file mode 100644
index 0000000..a970cbb
--- /dev/null
+++ b/debian/patches/CVE-2016-8745.patch
@@ -0,0 +1,30 @@
+Description: Fixes: CVE-2016-8745: When unable to complete sendfile request,
+ ensure the Processor will be added to the cache only once.
+ This bug in the error handling of the send file code for the NIO HTTP connector
+ resulted in the current Processor object being added to the Processor cache
+ multiple times. This in turn meant that the same Processor could be used for
+ concurrent requests. Sharing a Processor can result in information leakage
+ between requests including, not not limited to, session ID and the response
+ body.
+Origin: backport, https://svn.apache.org/r1777469 13f79535-47bb-0310-9956-ffa450edef68
+Bug: https://bz.apache.org/bugzilla/show_bug.cgi?id=60409
+--- a/java/org/apache/tomcat/util/net/NioEndpoint.java
++++ b/java/org/apache/tomcat/util/net/NioEndpoint.java
+@@ -1251,11 +1251,15 @@
+                 }
+             }catch ( IOException x ) {
+                 if ( log.isDebugEnabled() ) log.debug("Unable to complete sendfile request:", x);
+-                cancelledKey(sk,SocketStatus.ERROR);
++                if (!event) {
++                    cancelledKey(sk,SocketStatus.ERROR);
++                }
+                 return false;
+             }catch ( Throwable t ) {
+                 log.error("",t);
+-                cancelledKey(sk, SocketStatus.ERROR);
++                if (!event) {
++                    cancelledKey(sk, SocketStatus.ERROR);
++                }
+                 return false;
+             }finally {
+                 if (sc!=null) sc.setSendFile(false);
diff --git a/debian/patches/series b/debian/patches/series
index 9b4eacd..45f2d8f 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -32,3 +32,4 @@ CVE-2016-6797.patch
 CVE-2016-6816.patch
 BZ-57377.patch
 CVE-2016-8735.patch
+CVE-2016-8745.patch

-- 
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-java/tomcat8.git



More information about the pkg-java-commits mailing list