USN-4448-1: Tomcat vulnerabilities
4 August 2020
Several security issues were fixed in Tomcat.
Releases
Packages
- tomcat8 - Servlet and JSP engine
Details
It was discovered that Tomcat incorrectly validated the payload length in
a WebSocket frame. A remote attacker could possibly use this issue to cause
Tomcat to hang, resulting in a denial of service. (CVE-2020-13935)
It was discovered that Tomcat incorrectly handled HTTP header parsing. In
certain environments where Tomcat is located behind a reverse proxy, a
remote attacker could possibly use this issue to perform HTTP Reqest
Smuggling. (CVE-2020-1935)
It was discovered that Tomcat incorrectly handled certain uncommon
PersistenceManager with FileStore configurations. A remote attacker could
possibly use this issue to execute arbitrary code. (CVE-2020-9484)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-4596-1: tomcat9-admin, tomcat9, libtomcat9-java, tomcat9-user, libtomcat9-embed-java, tomcat9-docs, tomcat9-common, tomcat9-examples
- USN-5360-1: tomcat9-admin, tomcat9, libtomcat9-java, tomcat9-user, libtomcat9-embed-java, tomcat9-docs, tomcat9-common, tomcat9-examples
- USN-6908-1: tomcat7-common, tomcat7, tomcat7-user, tomcat7-admin, libtomcat7-java, tomcat7-docs, tomcat7-examples, libservlet3.0-java, libservlet3.0-java-doc
- USN-6943-1: tomcat9-admin, libtomcat9-java, tomcat8-common, tomcat9, tomcat9-user, libtomcat8-java, libtomcat9-embed-java, tomcat8-admin, libservlet3.1-java, tomcat8, tomcat8-user, tomcat8-docs, libtomcat8-embed-java, libservlet3.1-java-doc, tomcat9-common, tomcat9-docs, tomcat9-examples, tomcat8-examples