* SECURITY UPDATE: cross-request information leakage
- debian/patches/0016-CVE-2011-3375.patch: ensure that the request and
response objects are recycled after being re-populated in
java/org/apache/catalina/connector/CoyoteAdapter.java,
java/org/apache/coyote/ajp/AjpAprProcessor.java,
java/org/apache/coyote/ajp/AjpProcessor.java,
java/org/apache/coyote/http11/Http11AprProcessor.java,
java/org/apache/coyote/http11/Http11NioProcessor.java,
java/org/apache/coyote/http11/Http11Processor.java.
- CVE-2011-3375
* SECURITY UPDATE: denial of service via hash collision and incorrect
handling of large numbers of parameters and parameter values
(LP: #909828)
- debian/patches/0017-CVE-2012-0022.patch: refactor parameter handling
code in conf/web.xml,
java/org/apache/catalina/connector/Connector.java,
java/org/apache/catalina/connector/mbeans-descriptors.xml,
java/org/apache/catalina/connector/Request.java,
java/org/apache/catalina/filters/FilterBase.java,
java/org/apache/catalina/filters/FailedRequestFilter.java,
java/org/apache/catalina/Globals.java,
java/org/apache/coyote/Request.java,
java/org/apache/tomcat/util/buf/B2CConverter.java,
java/org/apache/tomcat/util/buf/ByteChunk.java,
java/org/apache/tomcat/util/buf/MessageBytes.java,
java/org/apache/tomcat/util/buf/StringCache.java,
java/org/apache/tomcat/util/http/LocalStrings.properties,
java/org/apache/tomcat/util/http/Parameters.java,
webapps/docs/config/ajp.xml,
webapps/docs/config/filter.xml,
webapps/docs/config/http.xml.
- CVE-2011-4858
- CVE-2012-0022
-- Marc Deslauriers <email address hidden> Wed, 25 Jan 2012 09:00:23 -0500
This bug was fixed in the package tomcat6 - 6.0.32-5ubuntu1.2
---------------
tomcat6 (6.0.32-5ubuntu1.2) oneiric-security; urgency=low
* SECURITY UPDATE: cross-request information leakage patches/ 0016-CVE- 2011-3375. patch: ensure that the request and org/apache/ catalina/ connector/ CoyoteAdapter. java, org/apache/ coyote/ ajp/AjpAprProce ssor.java, org/apache/ coyote/ ajp/AjpProcesso r.java, org/apache/ coyote/ http11/ Http11AprProces sor.java, org/apache/ coyote/ http11/ Http11NioProces sor.java, org/apache/ coyote/ http11/ Http11Processor .java. patches/ 0017-CVE- 2012-0022. patch: refactor parameter handling org/apache/ catalina/ connector/ Connector. java, org/apache/ catalina/ connector/ mbeans- descriptors. xml, org/apache/ catalina/ connector/ Request. java, org/apache/ catalina/ filters/ FilterBase. java, org/apache/ catalina/ filters/ FailedRequestFi lter.java, org/apache/ catalina/ Globals. java, org/apache/ coyote/ Request. java, org/apache/ tomcat/ util/buf/ B2CConverter. java, org/apache/ tomcat/ util/buf/ ByteChunk. java, org/apache/ tomcat/ util/buf/ MessageBytes. java, org/apache/ tomcat/ util/buf/ StringCache. java, org/apache/ tomcat/ util/http/ LocalStrings. properties, org/apache/ tomcat/ util/http/ Parameters. java, docs/config/ ajp.xml, docs/config/ filter. xml, docs/config/ http.xml.
- debian/
response objects are recycled after being re-populated in
java/
java/
java/
java/
java/
java/
- CVE-2011-3375
* SECURITY UPDATE: denial of service via hash collision and incorrect
handling of large numbers of parameters and parameter values
(LP: #909828)
- debian/
code in conf/web.xml,
java/
java/
java/
java/
java/
java/
java/
java/
java/
java/
java/
java/
java/
webapps/
webapps/
webapps/
- CVE-2011-4858
- CVE-2012-0022
-- Marc Deslauriers <email address hidden> Wed, 25 Jan 2012 09:00:23 -0500