~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to active/CVE-2016-8745

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
PublicDateAtUSN: 2017-01-13
2
 
Candidate: CVE-2016-8745
3
 
PublicDate: 2017-08-10
4
 
References: 
5
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8745
6
 
 http://www.openwall.com/lists/oss-security/2016/12/12/1
7
 
 https://usn.ubuntu.com/usn/usn-3177-1
8
 
Description:
9
 
 A bug in the error handling of the send file code for the NIO HTTP
10
 
 connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1
11
 
 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current
12
 
 Processor object being added to the Processor cache multiple times. This in
13
 
 turn meant that the same Processor could be used for concurrent requests.
14
 
 Sharing a Processor can result in information leakage between requests
15
 
 including, not not limited to, session ID and the response body. The bug
16
 
 was first noticed in 8.5.x onwards where it appears the refactoring of the
17
 
 Connector code for 8.5.x onwards made it more likely that the bug was
18
 
 observed. Initially it was thought that the 8.5.x refactoring introduced
19
 
 the bug but further investigation has shown that the bug is present in all
20
 
 currently supported Tomcat versions.
21
 
Ubuntu-Description: 
22
 
Notes: 
23
 
Bugs: 
24
 
 https://bz.apache.org/bugzilla/show_bug.cgi?id=60409
25
 
 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802312
26
 
Priority: medium
27
 
Discovered-by:
28
 
Assigned-to: mdeslaur
29
 
 
30
 
Patches_tomcat6:
31
 
 upstream: http://svn.apache.org/viewvc?view=revision&revision=1777472
32
 
upstream_tomcat6: released (6.0.49)
33
 
precise_tomcat6: released (6.0.35-1ubuntu3.9)
34
 
precise/esm_tomcat6: released (6.0.35-1ubuntu3.9)
35
 
trusty_tomcat6: needed
36
 
vivid/stable-phone-overlay_tomcat6: DNE
37
 
vivid/ubuntu-core_tomcat6: DNE
38
 
xenial_tomcat6: needed
39
 
yakkety_tomcat6: DNE
40
 
zesty_tomcat6: DNE
41
 
artful_tomcat6: DNE
42
 
bionic_tomcat6: DNE
43
 
devel_tomcat6: DNE
44
 
 
45
 
Patches_tomcat7:
46
 
 upstream: http://svn.apache.org/viewvc?view=revision&revision=1777471
47
 
upstream_tomcat7: released (7.0.74)
48
 
precise_tomcat7: ignored (reached end-of-life)
49
 
precise/esm_tomcat7: DNE (precise was needed)
50
 
trusty_tomcat7: released (7.0.52-1ubuntu0.8)
51
 
vivid/stable-phone-overlay_tomcat7: DNE
52
 
vivid/ubuntu-core_tomcat7: DNE
53
 
xenial_tomcat7: needed
54
 
yakkety_tomcat7: ignored (reached end-of-life)
55
 
zesty_tomcat7: ignored (reached end-of-life)
56
 
artful_tomcat7: needed
57
 
bionic_tomcat7: needed
58
 
devel_tomcat7: needed
59
 
 
60
 
Patches_tomcat8:
61
 
 upstream: http://svn.apache.org/viewvc?view=revision&revision=1777469
62
 
upstream_tomcat8: released (8.0.40)
63
 
precise_tomcat8: DNE
64
 
precise/esm_tomcat8: DNE
65
 
trusty_tomcat8: DNE
66
 
vivid/stable-phone-overlay_tomcat8: DNE
67
 
vivid/ubuntu-core_tomcat8: DNE
68
 
xenial_tomcat8: released (8.0.32-1ubuntu1.3)
69
 
yakkety_tomcat8: released (8.0.37-1ubuntu0.1)
70
 
zesty_tomcat8: released (8.0.38-2ubuntu1)
71
 
artful_tomcat8: released (8.0.38-2ubuntu1)
72
 
bionic_tomcat8: released (8.0.38-2ubuntu1)
73
 
devel_tomcat8: released (8.0.38-2ubuntu1)