Updated tomcat packages fix security vulnerability
Publication date: 21 Sep 2017Modification date: 21 Sep 2017
Type: security
Affected Mageia releases : 5 , 6
CVE: CVE-2017-7674 , CVE-2017-12616
Description
The CORS Filter did not add an HTTP Vary header indicating that the response varies depending on Origin. This permitted client and server side cache poisoning in some circumstances (CVE-2017-7674). When using a VirtualDirContext it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request (CVE-2017-12616). Note that CVE-2017-12616 only affected tomcat 7 in Mageia 5.
References
- https://bugs.mageia.org/show_bug.cgi?id=21714
- https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.79
- https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81
- https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.45
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/CH5PGYTIBGQHGGUEXRIIGNXJSLBNYYUS/
- http://openwall.com/lists/oss-security/2017/09/19/2
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7674
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12616
SRPMS
5/core
- tomcat-7.0.81-1.mga5
6/core
- tomcat-8.0.46-1.mga6