[Git][java-team/tomcat9][buster] Update changelog

Markus Koschany gitlab at salsa.debian.org
Wed Jul 15 12:58:21 BST 2020



Markus Koschany pushed to branch buster at Debian Java Maintainers / tomcat9


Commits:
1ac6d044 by Markus Koschany at 2020-07-15T13:46:06+02:00
Update changelog

- - - - -


1 changed file:

- debian/changelog


Changes:

=====================================
debian/changelog
=====================================
@@ -1,6 +1,8 @@
-tomcat9 (9.0.31-1~deb10u2) buster-security; urgency=medium
+tomcat9 (9.0.31-1~deb10u2) buster-security; urgency=high
 
   * Team upload.
+
+  [ Emmanuel Bourg ]
   * Fixed CVE-2020-13935: WebSocket Denial of Service. The payload length
     in a WebSocket frame was not correctly validated. Invalid payload lengths
     could trigger an infinite loop. Multiple requests with invalid payload
@@ -10,7 +12,26 @@ tomcat9 (9.0.31-1~deb10u2) buster-security; urgency=medium
     sufficient number of such requests were made, an OutOfMemoryException
     could occur leading to a denial of service.
 
- -- Emmanuel Bourg <ebourg at apache.org>  Tue, 14 Jul 2020 22:11:58 +0200
+  [ Markus Koschany ]
+  * Fix CVE-2020-9484:
+    When using Apache Tomcat an attacker is able to control the contents and
+    name of a file on the server; and b) the server is configured to use the
+    PersistenceManager with a FileStore; and c) the PersistenceManager is
+    configured with sessionAttributeValueClassNameFilter="null" (the default
+    unless a SecurityManager is used) or a sufficiently lax filter to allow the
+    attacker provided object to be deserialized; and d) the attacker knows the
+    relative file path from the storage location used by FileStore to the file
+    the attacker has control over; then, using a specifically crafted request,
+    the attacker will be able to trigger remote code execution via
+    deserialization of the file under their control. Note that all of
+    conditions a) to d) must be true for the attack to succeed.
+  * Fix CVE-2020-11996:
+    A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat could
+    trigger high CPU usage for several seconds. If a sufficient number of such
+    requests were made on concurrent HTTP/2 connections, the server could
+    become unresponsive.
+
+ -- Markus Koschany <apo at debian.org>  Wed, 15 Jul 2020 13:43:33 +0200
 
 tomcat9 (9.0.31-1~deb10u1) buster-security; urgency=high
 



View it on GitLab: https://salsa.debian.org/java-team/tomcat9/-/commit/1ac6d044793df53915acd6abc7e454907cba1cc1

-- 
View it on GitLab: https://salsa.debian.org/java-team/tomcat9/-/commit/1ac6d044793df53915acd6abc7e454907cba1cc1
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/pkg-java-commits/attachments/20200715/e4166fc7/attachment.html>


More information about the pkg-java-commits mailing list