ALT-BU-2020-4060-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2019-01524
Уязвимость компонента RMI программных платформ Oracle Java SE и Java SE Embedded, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных
BDU:2019-04404
Уязвимость сервера приложений Apache Tomcat, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00937
Уязвимость Apache Jserv Protocol - коннектора сервера приложений Apache Tomcat, позволяющая нарушителю выполнить произвольный код
BDU:2020-01021
Уязвимость команды printenv сервера приложений Apache Tomcat, позволяющая нарушителю осуществить межсайтовую сценарную атаку
BDU:2020-01022
Уязвимость реализации сетевого протокола HTTP/2 веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01971
Уязвимость формы аутентификации сервера приложений Apache Tomcat, связанная с недостатком механизма фиксации сеанса, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных
BDU:2020-01972
Уязвимость компонента работы с JMX сервера приложений Apache Tomcat, связанная с недостатком механизма защиты регистрационных данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных
BDU:2020-03567
Уязвимость сервера приложений Apache Tomcat, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-04938
Уязвимость сервера приложений Apache Tomcat, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00506
Уязвимость сервера приложений Apache Tomcat, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00783
Уязвимость сервера приложений Apache Tomcat, связанная с выходом операции за границы буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03062
Уязвимость сервера приложений Apache Tomcat, связанная с ошибками при одновременном закрытии соединения WebSocket и отправки сообщения WebSocket, позволяющая нарушителю раскрыть защищаемую информацию или оказать другое воздействие
Modified: 2024-11-21
CVE-2019-0199
The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.
- openSUSE-SU-2019:1673
- openSUSE-SU-2019:1673
- openSUSE-SU-2019:1723
- openSUSE-SU-2019:1723
- openSUSE-SU-2019:1808
- openSUSE-SU-2019:1808
- 107674
- 107674
- RHSA-2019:3929
- RHSA-2019:3929
- RHSA-2019:3931
- RHSA-2019:3931
- [tomcat-dev] 20190620 svn commit: r1861711 - in /tomcat/site/trunk: docs/security-8.html docs/security-9.html xdocs/security-8.xml xdocs/security-9.xml
- [tomcat-dev] 20190620 svn commit: r1861711 - in /tomcat/site/trunk: docs/security-8.html docs/security-9.html xdocs/security-8.xml xdocs/security-9.xml
- [tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/
- [tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/
- [tomcat-dev] 20190620 [SECURITY] CVE-2019-10072 Apache Tomcat HTTP/2 DoS
- [tomcat-dev] 20190620 [SECURITY] CVE-2019-10072 Apache Tomcat HTTP/2 DoS
- [tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/
- [tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/
- [tomcat-users] 20190620 [SECURITY][CORRECTION] CVE-2019-10072 Apache Tomcat HTTP/2 DoS
- [tomcat-users] 20190620 [SECURITY][CORRECTION] CVE-2019-10072 Apache Tomcat HTTP/2 DoS
- [tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/
- [tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/
- [tomcat-users] 20190620 Re: [EXTERNAL] [SECURITY] CVE-2019-10072 Apache Tomcat HTTP/2 DoS
- [tomcat-users] 20190620 Re: [EXTERNAL] [SECURITY] CVE-2019-10072 Apache Tomcat HTTP/2 DoS
- [tomcat-dev] 20190620 [SECURITY][CORRECTION] CVE-2019-10072 Apache Tomcat HTTP/2 DoS
- [tomcat-dev] 20190620 [SECURITY][CORRECTION] CVE-2019-10072 Apache Tomcat HTTP/2 DoS
- [announce] 20190620 [SECURITY][CORRECTION] CVE-2019-10072 Apache Tomcat HTTP/2 DoS
- [announce] 20190620 [SECURITY][CORRECTION] CVE-2019-10072 Apache Tomcat HTTP/2 DoS
- [announce] 20190620 [SECURITY] CVE-2019-10072 Apache Tomcat HTTP/2 DoS
- [announce] 20190620 [SECURITY] CVE-2019-10072 Apache Tomcat HTTP/2 DoS
- [tomcat-announce] 20190620 [SECURITY][CORRECTION] CVE-2019-10072 Apache Tomcat HTTP/2 DoS
- [tomcat-announce] 20190620 [SECURITY][CORRECTION] CVE-2019-10072 Apache Tomcat HTTP/2 DoS
- [tomcat-announce] 20190620 [SECURITY] CVE-2019-10072 Apache Tomcat HTTP/2 DoS
- [tomcat-announce] 20190620 [SECURITY] CVE-2019-10072 Apache Tomcat HTTP/2 DoS
- https://lists.apache.org/thread.html/e1b0b273b6e8ddcc72c9023bc2394b1276fc72664144bf21d0a87995%40%3Cannounce.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/e1b0b273b6e8ddcc72c9023bc2394b1276fc72664144bf21d0a87995%40%3Cannounce.tomcat.apache.org%3E
- [tomee-commits] 20190528 [jira] [Closed] (TOMEE-2497) Upgrade Tomcat in TomEE 7.0.x/7.1.x/8.0.x for CVE-2019-0199
- [tomee-commits] 20190528 [jira] [Closed] (TOMEE-2497) Upgrade Tomcat in TomEE 7.0.x/7.1.x/8.0.x for CVE-2019-0199
- [tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/
- [tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/
- [tomcat-users] 20190620 [SECURITY] CVE-2019-10072 Apache Tomcat HTTP/2 DoS
- [tomcat-users] 20190620 [SECURITY] CVE-2019-10072 Apache Tomcat HTTP/2 DoS
- [tomcat-dev] 20200203 svn commit: r1873527 [25/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200203 svn commit: r1873527 [25/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [29/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [29/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200203 svn commit: r1873527 [24/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200203 svn commit: r1873527 [24/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [28/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [28/34] - /tomcat/site/trunk/docs/
- FEDORA-2019-d66febb5df
- FEDORA-2019-d66febb5df
- FEDORA-2019-1a3f878d27
- FEDORA-2019-1a3f878d27
- 20191229 [SECURITY] [DSA 4596-1] tomcat8 security update
- 20191229 [SECURITY] [DSA 4596-1] tomcat8 security update
- https://security.netapp.com/advisory/ntap-20190419-0001/
- https://security.netapp.com/advisory/ntap-20190419-0001/
- https://support.f5.com/csp/article/K17321505
- https://support.f5.com/csp/article/K17321505
- DSA-4596
- DSA-4596
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Modified: 2024-11-21
CVE-2019-0221
The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website.
- openSUSE-SU-2019:1673
- openSUSE-SU-2019:1673
- openSUSE-SU-2019:1808
- openSUSE-SU-2019:1808
- http://packetstormsecurity.com/files/163457/Apache-Tomcat-9.0.0.M1-Cross-Site-Scripting.html
- http://packetstormsecurity.com/files/163457/Apache-Tomcat-9.0.0.M1-Cross-Site-Scripting.html
- 20190529 XSS in SSI printenv command - Apache Tomcat - CVE-2019-0221
- 20190529 XSS in SSI printenv command - Apache Tomcat - CVE-2019-0221
- 108545
- 108545
- RHSA-2019:3929
- RHSA-2019:3929
- RHSA-2019:3931
- RHSA-2019:3931
- https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c%40%3Cannounce.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c%40%3Cannounce.tomcat.apache.org%3E
- [tomcat-dev] 20200203 svn commit: r1873527 [25/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200203 svn commit: r1873527 [25/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [29/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [29/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200203 svn commit: r1873527 [24/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200203 svn commit: r1873527 [24/30] - /tomcat/site/trunk/docs/
- [announce] 20200131 Apache Software Foundation Security Report: 2019
- [announce] 20200131 Apache Software Foundation Security Report: 2019
- [tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [28/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [28/34] - /tomcat/site/trunk/docs/
- [debian-lts-announce] 20190530 [SECURITY] [DLA 1810-1] tomcat7 security update
- [debian-lts-announce] 20190530 [SECURITY] [DLA 1810-1] tomcat7 security update
- [debian-lts-announce] 20190813 [SECURITY] [DLA 1883-1] tomcat8 security update
- [debian-lts-announce] 20190813 [SECURITY] [DLA 1883-1] tomcat8 security update
- FEDORA-2019-d66febb5df
- FEDORA-2019-d66febb5df
- FEDORA-2019-1a3f878d27
- FEDORA-2019-1a3f878d27
- 20191229 [SECURITY] [DSA 4596-1] tomcat8 security update
- 20191229 [SECURITY] [DSA 4596-1] tomcat8 security update
- GLSA-202003-43
- GLSA-202003-43
- https://security.netapp.com/advisory/ntap-20190606-0001/
- https://security.netapp.com/advisory/ntap-20190606-0001/
- https://support.f5.com/csp/article/K13184144?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K13184144?utm_source=f5support&%3Butm_medium=RSS
- USN-4128-1
- USN-4128-1
- USN-4128-2
- USN-4128-2
- DSA-4596
- DSA-4596
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221/
- https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221/
Modified: 2024-11-21
CVE-2019-10072
The fix for CVE-2019-0199 was incomplete and did not address HTTP/2 connection window exhaustion on write in Apache Tomcat versions 9.0.0.M1 to 9.0.19 and 8.5.0 to 8.5.40 . By not sending WINDOW_UPDATE messages for the connection window (stream 0) clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.
- openSUSE-SU-2020:0038
- openSUSE-SU-2020:0038
- 108874
- 108874
- RHSA-2019:3929
- RHSA-2019:3929
- RHSA-2019:3931
- RHSA-2019:3931
- https://lists.apache.org/thread.html/df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a%40%3Cannounce.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a%40%3Cannounce.tomcat.apache.org%3E
- [tomcat-dev] 20200203 svn commit: r1873527 [25/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200203 svn commit: r1873527 [25/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [29/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [29/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200203 svn commit: r1873527 [24/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200203 svn commit: r1873527 [24/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [28/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [28/34] - /tomcat/site/trunk/docs/
- https://security.netapp.com/advisory/ntap-20190625-0002/
- https://security.netapp.com/advisory/ntap-20190625-0002/
- https://support.f5.com/csp/article/K17321505
- https://support.f5.com/csp/article/K17321505
- USN-4128-1
- USN-4128-1
- USN-4128-2
- USN-4128-2
- DSA-4680
- DSA-4680
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.synology.com/security/advisory/Synology_SA_19_29
- https://www.synology.com/security/advisory/Synology_SA_19_29
Modified: 2024-11-21
CVE-2019-12418
When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.
- openSUSE-SU-2020:0038
- openSUSE-SU-2020:0038
- https://lists.apache.org/thread.html/43530b91506e2e0c11cfbe691173f5df8c48f51b98262426d7493b67%40%3Cannounce.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/43530b91506e2e0c11cfbe691173f5df8c48f51b98262426d7493b67%40%3Cannounce.tomcat.apache.org%3E
- [tomcat-dev] 20200203 svn commit: r1873527 [25/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200203 svn commit: r1873527 [25/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [29/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [29/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200203 svn commit: r1873527 [24/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200203 svn commit: r1873527 [24/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [28/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [28/34] - /tomcat/site/trunk/docs/
- [debian-lts-announce] 20200127 [SECURITY] [DLA 2077-1] tomcat7 security update
- [debian-lts-announce] 20200127 [SECURITY] [DLA 2077-1] tomcat7 security update
- [debian-lts-announce] 20200324 [SECURITY] [DLA 2155-1] tomcat8 security update
- [debian-lts-announce] 20200324 [SECURITY] [DLA 2155-1] tomcat8 security update
- 20191229 [SECURITY] [DSA 4596-1] tomcat8 security update
- 20191229 [SECURITY] [DSA 4596-1] tomcat8 security update
- GLSA-202003-43
- GLSA-202003-43
- https://security.netapp.com/advisory/ntap-20200107-0001/
- https://security.netapp.com/advisory/ntap-20200107-0001/
- https://support.f5.com/csp/article/K10107360?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K10107360?utm_source=f5support&%3Butm_medium=RSS
- USN-4251-1
- USN-4251-1
- DSA-4596
- DSA-4596
- DSA-4680
- DSA-4680
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Modified: 2024-11-21
CVE-2019-17563
When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability.
- openSUSE-SU-2020:0038
- openSUSE-SU-2020:0038
- https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E
- [tomcat-dev] 20200203 svn commit: r1873527 [25/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200203 svn commit: r1873527 [25/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [29/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [29/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200203 svn commit: r1873527 [24/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200203 svn commit: r1873527 [24/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [28/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [28/34] - /tomcat/site/trunk/docs/
- [cxf-issues] 20200618 [jira] [Created] (FEDIZ-249) Relying party rejects a valid security token and redirects back to ADFS when using Fediz 1.4.6 with Tomcat 8.5.56
- [cxf-issues] 20200618 [jira] [Created] (FEDIZ-249) Relying party rejects a valid security token and redirects back to ADFS when using Fediz 1.4.6 with Tomcat 8.5.56
- [debian-lts-announce] 20200127 [SECURITY] [DLA 2077-1] tomcat7 security update
- [debian-lts-announce] 20200127 [SECURITY] [DLA 2077-1] tomcat7 security update
- [debian-lts-announce] 20200528 [SECURITY] [DLA 2209-1] tomcat8 security update
- [debian-lts-announce] 20200528 [SECURITY] [DLA 2209-1] tomcat8 security update
- 20191229 [SECURITY] [DSA 4596-1] tomcat8 security update
- 20191229 [SECURITY] [DSA 4596-1] tomcat8 security update
- GLSA-202003-43
- GLSA-202003-43
- https://security.netapp.com/advisory/ntap-20200107-0001/
- https://security.netapp.com/advisory/ntap-20200107-0001/
- USN-4251-1
- USN-4251-1
- DSA-4596
- DSA-4596
- DSA-4680
- DSA-4680
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
Modified: 2024-11-21
CVE-2019-2684
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
- openSUSE-SU-2019:1327
- openSUSE-SU-2019:1327
- openSUSE-SU-2019:1438
- openSUSE-SU-2019:1438
- openSUSE-SU-2019:1439
- openSUSE-SU-2019:1439
- openSUSE-SU-2019:1500
- openSUSE-SU-2019:1500
- [oss-security] 20200901 CVE-2020-13946 Apache Cassandra RMI Rebind Vulnerability
- [oss-security] 20200901 CVE-2020-13946 Apache Cassandra RMI Rebind Vulnerability
- http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- RHBA-2019:0959
- RHBA-2019:0959
- RHSA-2019:1146
- RHSA-2019:1146
- RHSA-2019:1163
- RHSA-2019:1163
- RHSA-2019:1164
- RHSA-2019:1164
- RHSA-2019:1165
- RHSA-2019:1165
- RHSA-2019:1166
- RHSA-2019:1166
- RHSA-2019:1238
- RHSA-2019:1238
- RHSA-2019:1325
- RHSA-2019:1325
- RHSA-2019:1518
- RHSA-2019:1518
- [tomcat-dev] 20191218 svn commit: r1871756 - in /tomcat/site/trunk: docs/security-7.html docs/security-8.html docs/security-9.html xdocs/security-7.xml xdocs/security-8.xml xdocs/security-9.xml
- [tomcat-dev] 20191218 svn commit: r1871756 - in /tomcat/site/trunk: docs/security-7.html docs/security-8.html docs/security-9.html xdocs/security-7.xml xdocs/security-8.xml xdocs/security-9.xml
- [tomcat-announce] 20191218 [SECURITY] CVE-2019-12418 Local Privilege Escalation
- [tomcat-announce] 20191218 [SECURITY] CVE-2019-12418 Local Privilege Escalation
- [tomcat-users] 20191218 [SECURITY] CVE-2019-12418 Local Privilege Escalation
- [tomcat-users] 20191218 [SECURITY] CVE-2019-12418 Local Privilege Escalation
- [announce] 20191218 [SECURITY] CVE-2019-12418 Local Privilege Escalation
- [announce] 20191218 [SECURITY] CVE-2019-12418 Local Privilege Escalation
- [tomcat-dev] 20191218 [SECURITY] CVE-2019-12418 Local Privilege Escalation
- [tomcat-dev] 20191218 [SECURITY] CVE-2019-12418 Local Privilege Escalation
- [cassandra-user] 20200902 Re: CVE-2020-13946 Apache Cassandra RMI Rebind Vulnerability
- [cassandra-user] 20200902 Re: CVE-2020-13946 Apache Cassandra RMI Rebind Vulnerability
- [tomcat-dev] 20200203 svn commit: r1873527 [25/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200203 svn commit: r1873527 [25/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [29/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [29/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200203 svn commit: r1873527 [24/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200203 svn commit: r1873527 [24/30] - /tomcat/site/trunk/docs/
- [cassandra-user] 20200901 Re: CVE-2020-13946 Apache Cassandra RMI Rebind Vulnerability
- [cassandra-user] 20200901 Re: CVE-2020-13946 Apache Cassandra RMI Rebind Vulnerability
- [tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/
- [cassandra-user] 20200911 Re: CVE-2020-13946 Apache Cassandra RMI Rebind Vulnerability
- [cassandra-user] 20200911 Re: CVE-2020-13946 Apache Cassandra RMI Rebind Vulnerability
- [tomcat-dev] 20200213 svn commit: r1873980 [28/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [28/34] - /tomcat/site/trunk/docs/
- [cassandra-dev] 20200901 CVE-2020-13946 Apache Cassandra RMI Rebind Vulnerability
- [cassandra-dev] 20200901 CVE-2020-13946 Apache Cassandra RMI Rebind Vulnerability
- [cassandra-user] 20200901 CVE-2020-13946 Apache Cassandra RMI Rebind Vulnerability
- [cassandra-user] 20200901 CVE-2020-13946 Apache Cassandra RMI Rebind Vulnerability
- [debian-lts-announce] 20190510 [SECURITY] [DLA 1782-1] openjdk-7 security update
- [debian-lts-announce] 20190510 [SECURITY] [DLA 1782-1] openjdk-7 security update
- 20190530 [SECURITY] [DSA 4453-1] openjdk-8 security update
- 20190530 [SECURITY] [DSA 4453-1] openjdk-8 security update
- GLSA-201908-10
- GLSA-201908-10
- https://support.f5.com/csp/article/K11175903?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K11175903?utm_source=f5support&%3Butm_medium=RSS
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03959en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03959en_us
- USN-3975-1
- USN-3975-1
- DSA-4453
- DSA-4453
Modified: 2024-11-21
CVE-2020-11996
A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.
- openSUSE-SU-2020:1051
- openSUSE-SU-2020:1063
- [tomcat-users] 20201008 Is Tomcat7 supports HTTP2
- [ofbiz-notifications] 20200703 [jira] [Commented] (OFBIZ-11848) Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- https://lists.apache.org/thread.html/r5541ef6b6b68b49f76fc4c45695940116da2bcbe0312ef204a00a2e0%40%3Cannounce.tomcat.apache.org%3E
- [ofbiz-notifications] 20210301 [jira] [Updated] (OFBIZ-11848) Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [ofbiz-notifications] 20200703 [jira] [Closed] (OFBIZ-11848) Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [ofbiz-commits] 20200628 [ofbiz-framework] branch release18.12 updated: Fixed: Upgrades Tomcat to 9.0.36 due to CVE-2020-11996 (OFBIZ-11848)
- [ofbiz-commits] 20200628 [ofbiz-framework] branch trunk updated: Fixed: Upgrades Tomcat to 9.0.36 due to CVE-2020-11996 (OFBIZ-11848)
- [ofbiz-notifications] 20200628 [jira] [Created] (OFBIZ-11847) CLONE - Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [ofbiz-commits] 20200628 [ofbiz-framework] branch release17.12 updated: Fixed: Upgrades Tomcat to 9.0.36 due to CVE-2020-11996 (OFBIZ-11848)
- [ofbiz-notifications] 20200701 [jira] [Reopened] (OFBIZ-11848) Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [ofbiz-notifications] 20200628 [jira] [Updated] (OFBIZ-11847) CLONE - Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [ofbiz-notifications] 20200628 [jira] [Closed] (OFBIZ-11847) CLONE - Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [ofbiz-notifications] 20200628 [jira] [Created] (OFBIZ-11848) Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [ofbiz-notifications] 20200628 [jira] [Commented] (OFBIZ-11848) Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [ofbiz-notifications] 20200628 [jira] [Closed] (OFBIZ-11848) Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [ofbiz-notifications] 20200703 [jira] [Comment Edited] (OFBIZ-11848) Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [debian-lts-announce] 20200712 [SECURITY] [DLA 2279-1] tomcat8 security update
- https://security.netapp.com/advisory/ntap-20200709-0002/
- USN-4596-1
- DSA-4727
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- openSUSE-SU-2020:1051
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- DSA-4727
- USN-4596-1
- https://security.netapp.com/advisory/ntap-20200709-0002/
- [debian-lts-announce] 20200712 [SECURITY] [DLA 2279-1] tomcat8 security update
- [ofbiz-notifications] 20200703 [jira] [Comment Edited] (OFBIZ-11848) Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [ofbiz-notifications] 20200628 [jira] [Closed] (OFBIZ-11848) Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [ofbiz-notifications] 20200628 [jira] [Commented] (OFBIZ-11848) Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [ofbiz-notifications] 20200628 [jira] [Created] (OFBIZ-11848) Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [ofbiz-notifications] 20200628 [jira] [Closed] (OFBIZ-11847) CLONE - Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [ofbiz-notifications] 20200628 [jira] [Updated] (OFBIZ-11847) CLONE - Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [ofbiz-notifications] 20200701 [jira] [Reopened] (OFBIZ-11848) Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [ofbiz-commits] 20200628 [ofbiz-framework] branch release17.12 updated: Fixed: Upgrades Tomcat to 9.0.36 due to CVE-2020-11996 (OFBIZ-11848)
- [ofbiz-notifications] 20200628 [jira] [Created] (OFBIZ-11847) CLONE - Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [ofbiz-commits] 20200628 [ofbiz-framework] branch trunk updated: Fixed: Upgrades Tomcat to 9.0.36 due to CVE-2020-11996 (OFBIZ-11848)
- [ofbiz-commits] 20200628 [ofbiz-framework] branch release18.12 updated: Fixed: Upgrades Tomcat to 9.0.36 due to CVE-2020-11996 (OFBIZ-11848)
- [ofbiz-notifications] 20200703 [jira] [Closed] (OFBIZ-11848) Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [ofbiz-notifications] 20210301 [jira] [Updated] (OFBIZ-11848) Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- https://lists.apache.org/thread.html/r5541ef6b6b68b49f76fc4c45695940116da2bcbe0312ef204a00a2e0%40%3Cannounce.tomcat.apache.org%3E
- [ofbiz-notifications] 20200703 [jira] [Commented] (OFBIZ-11848) Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [tomcat-users] 20201008 Is Tomcat7 supports HTTP2
- openSUSE-SU-2020:1063
Modified: 2024-11-21
CVE-2020-13934
An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.0.36 and 8.5.1 to 8.5.56 did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service.
- openSUSE-SU-2020:1102
- openSUSE-SU-2020:1111
- https://lists.apache.org/thread.html/r61f411cf82488d6ec213063fc15feeeb88e31b0ca9c29652ee4f962e%40%3Cannounce.tomcat.apache.org%3E
- [tomcat-dev] 20200818 [Bug 64671] HTTP/2 Stream.receivedData method throwing continuous NullPointerException in the logs
- [debian-lts-announce] 20200722 [SECURITY] [DLA 2286-1] tomcat8 security update
- https://security.netapp.com/advisory/ntap-20200724-0003/
- USN-4596-1
- DSA-4727
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- openSUSE-SU-2020:1102
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- DSA-4727
- USN-4596-1
- https://security.netapp.com/advisory/ntap-20200724-0003/
- [debian-lts-announce] 20200722 [SECURITY] [DLA 2286-1] tomcat8 security update
- [tomcat-dev] 20200818 [Bug 64671] HTTP/2 Stream.receivedData method throwing continuous NullPointerException in the logs
- https://lists.apache.org/thread.html/r61f411cf82488d6ec213063fc15feeeb88e31b0ca9c29652ee4f962e%40%3Cannounce.tomcat.apache.org%3E
- openSUSE-SU-2020:1111
Modified: 2024-11-21
CVE-2020-13935
The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.
- openSUSE-SU-2020:1102
- openSUSE-SU-2020:1111
- https://kc.mcafee.com/corporate/index?page=content&id=SB10332
- [tomcat-users] 20201118 Re: Strange crash-on-takeoff, Tomcat 7.0.104
- https://lists.apache.org/thread.html/rd48c72bd3255bda87564d4da3791517c074d94f8a701f93b85752651%40%3Cannounce.tomcat.apache.org%3E
- [debian-lts-announce] 20200722 [SECURITY] [DLA 2286-1] tomcat8 security update
- https://security.netapp.com/advisory/ntap-20200724-0003/
- USN-4448-1
- USN-4596-1
- DSA-4727
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- openSUSE-SU-2020:1102
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- DSA-4727
- USN-4596-1
- USN-4448-1
- https://security.netapp.com/advisory/ntap-20200724-0003/
- [debian-lts-announce] 20200722 [SECURITY] [DLA 2286-1] tomcat8 security update
- https://lists.apache.org/thread.html/rd48c72bd3255bda87564d4da3791517c074d94f8a701f93b85752651%40%3Cannounce.tomcat.apache.org%3E
- [tomcat-users] 20201118 Re: Strange crash-on-takeoff, Tomcat 7.0.104
- https://kc.mcafee.com/corporate/index?page=content&id=SB10332
- openSUSE-SU-2020:1111
Modified: 2024-11-21
CVE-2020-1935
In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.
- openSUSE-SU-2020:0345
- openSUSE-SU-2020:0345
- [tomcat-announce] 20200224 [SECURITY] CVE-2020-1935 HTTP Request Smuggling
- [tomcat-announce] 20200224 [SECURITY] CVE-2020-1935 HTTP Request Smuggling
- [tomcat-users] 20200724 CVE-2020-1935
- [tomcat-users] 20200724 CVE-2020-1935
- [tomcat-users] 20200724 Re: CVE-2020-1935
- [tomcat-users] 20200724 Re: CVE-2020-1935
- [tomee-commits] 20200323 [jira] [Commented] (TOMEE-2790) TomEE plus(7.0.7) is affected by CVE-2020-1935 & CVE-2019-17569 vulnerabilities
- [tomee-commits] 20200323 [jira] [Commented] (TOMEE-2790) TomEE plus(7.0.7) is affected by CVE-2020-1935 & CVE-2019-17569 vulnerabilities
- [tomcat-users] 20200727 RE: CVE-2020-1935
- [tomcat-users] 20200727 RE: CVE-2020-1935
- [tomcat-dev] 20210428 [Bug 65272] Problems proccessing HTTP request without CR in last versions
- [tomcat-dev] 20210428 [Bug 65272] Problems proccessing HTTP request without CR in last versions
- [tomcat-users] 20200726 Re: CVE-2020-1935
- [tomcat-users] 20200726 Re: CVE-2020-1935
- [tomee-commits] 20200320 [jira] [Created] (TOMEE-2790) TomEE plus(7.0.7) is affected by CVE-2020-1935 & CVE-2019-17569 vulnerabilities
- [tomee-commits] 20200320 [jira] [Created] (TOMEE-2790) TomEE plus(7.0.7) is affected by CVE-2020-1935 & CVE-2019-17569 vulnerabilities
- [tomcat-users] 20200724 RE: CVE-2020-1935
- [tomcat-users] 20200724 RE: CVE-2020-1935
- [debian-lts-announce] 20200304 [SECURITY] [DLA 2133-1] tomcat7 security update
- [debian-lts-announce] 20200304 [SECURITY] [DLA 2133-1] tomcat7 security update
- [debian-lts-announce] 20200528 [SECURITY] [DLA 2209-1] tomcat8 security update
- [debian-lts-announce] 20200528 [SECURITY] [DLA 2209-1] tomcat8 security update
- https://security.netapp.com/advisory/ntap-20200327-0005/
- https://security.netapp.com/advisory/ntap-20200327-0005/
- USN-4448-1
- USN-4448-1
- DSA-4673
- DSA-4673
- DSA-4680
- DSA-4680
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
Modified: 2024-11-21
CVE-2020-1938
When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.
- openSUSE-SU-2020:0345
- openSUSE-SU-2020:0345
- openSUSE-SU-2020:0597
- openSUSE-SU-2020:0597
- http://support.blackberry.com/kb/articleDetail?articleNumber=000062739
- http://support.blackberry.com/kb/articleDetail?articleNumber=000062739
- [tomee-dev] 20200311 CVE-2020-1938 on Tomcat 9.0.30 / TomEE 8.0.1
- [tomee-dev] 20200311 CVE-2020-1938 on Tomcat 9.0.30 / TomEE 8.0.1
- [announce] 20210223 Re: Apache Software Foundation Security Report: 2020
- [announce] 20210223 Re: Apache Software Foundation Security Report: 2020
- [tomcat-users] 20200302 AW: [SECURITY] CVE-2020-1938 AJP Request Injection and potentialRemote Code Execution
- [tomcat-users] 20200302 AW: [SECURITY] CVE-2020-1938 AJP Request Injection and potentialRemote Code Execution
- [tomcat-users] 20200302 Re: AW: [SECURITY] CVE-2020-1938 AJP Request Injection and potentialRemote Code Execution
- [tomcat-users] 20200302 Re: AW: [SECURITY] CVE-2020-1938 AJP Request Injection and potentialRemote Code Execution
- [tomcat-users] 20200413 RE: Alternatives for AJP
- [tomcat-users] 20200413 RE: Alternatives for AJP
- [tomee-commits] 20201127 [jira] [Updated] (TOMEE-2789) TomEE plus(7.0.7) is affected by CVE-2020-1938(BDSA-2020-0339) vulnerability.
- [tomee-commits] 20201127 [jira] [Updated] (TOMEE-2789) TomEE plus(7.0.7) is affected by CVE-2020-1938(BDSA-2020-0339) vulnerability.
- [tomcat-users] 20200304 Re: Fix for CVE-2020-1938
- [tomcat-users] 20200304 Re: Fix for CVE-2020-1938
- [tomcat-users] 20200310 Aw: Re: Re: Fix for CVE-2020-1938
- [tomcat-users] 20200310 Aw: Re: Re: Fix for CVE-2020-1938
- [tomcat-dev] 20200309 [Bug 64206] Answer file not being used
- [tomcat-dev] 20200309 [Bug 64206] Answer file not being used
- [tomee-commits] 20201127 [jira] [Resolved] (TOMEE-2789) TomEE plus(7.0.7) is affected by CVE-2020-1938(BDSA-2020-0339) vulnerability.
- [tomee-commits] 20201127 [jira] [Resolved] (TOMEE-2789) TomEE plus(7.0.7) is affected by CVE-2020-1938(BDSA-2020-0339) vulnerability.
- [tomcat-users] 20200305 Re: Aw: Re: Fix for CVE-2020-1938
- [tomcat-users] 20200305 Re: Aw: Re: Fix for CVE-2020-1938
- [tomcat-users] 20200309 Re: Apache Tomcat AJP File Inclusion Vulnerability (unauthenticated check)
- [tomcat-users] 20200309 Re: Apache Tomcat AJP File Inclusion Vulnerability (unauthenticated check)
- [tomee-commits] 20200323 [jira] [Commented] (TOMEE-2789) TomEE plus(7.0.7) is affected by CVE-2020-1938(BDSA-2020-0339) vulnerability.
- [tomee-commits] 20200323 [jira] [Commented] (TOMEE-2789) TomEE plus(7.0.7) is affected by CVE-2020-1938(BDSA-2020-0339) vulnerability.
- [ofbiz-notifications] 20200227 [jira] [Commented] (OFBIZ-11407) Upgrade Tomcat from 9.0.29 to 9.0.31 (CVE-2020-1938)
- [ofbiz-notifications] 20200227 [jira] [Commented] (OFBIZ-11407) Upgrade Tomcat from 9.0.29 to 9.0.31 (CVE-2020-1938)
- [ofbiz-notifications] 20200225 [jira] [Updated] (OFBIZ-11407) Upgrade Tomcat from 9.0.29 to 9.0.31 (CVE-2020-1938)
- [ofbiz-notifications] 20200225 [jira] [Updated] (OFBIZ-11407) Upgrade Tomcat from 9.0.29 to 9.0.31 (CVE-2020-1938)
- [tomcat-dev] 20200304 Re: Tagging 10.0.x, 9.0.x, 8.5.x
- [tomcat-dev] 20200304 Re: Tagging 10.0.x, 9.0.x, 8.5.x
- [tomcat-announce] 20200224 [SECURITY] CVE-2020-1938 AJP Request Injection and potential Remote Code Execution
- [tomcat-announce] 20200224 [SECURITY] CVE-2020-1938 AJP Request Injection and potential Remote Code Execution
- [ofbiz-notifications] 20200225 [jira] [Commented] (OFBIZ-11407) Upgrade Tomcat from 9.0.29 to 9.0.31 (CVE-2020-1938)
- [ofbiz-notifications] 20200225 [jira] [Commented] (OFBIZ-11407) Upgrade Tomcat from 9.0.29 to 9.0.31 (CVE-2020-1938)
- [ofbiz-notifications] 20200628 [jira] [Created] (OFBIZ-11847) CLONE - Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [ofbiz-notifications] 20200628 [jira] [Created] (OFBIZ-11847) CLONE - Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [announce] 20210125 Apache Software Foundation Security Report: 2020
- [announce] 20210125 Apache Software Foundation Security Report: 2020
- [tomee-users] 20200723 Re: TomEE on Docker
- [tomee-users] 20200723 Re: TomEE on Docker
- [tomcat-users] 20200310 Re: Re: Re: Fix for CVE-2020-1938
- [tomcat-users] 20200310 Re: Re: Re: Fix for CVE-2020-1938
- [ofbiz-notifications] 20200628 [jira] [Updated] (OFBIZ-11847) CLONE - Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [ofbiz-notifications] 20200628 [jira] [Updated] (OFBIZ-11847) CLONE - Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)
- [ofbiz-notifications] 20200228 [jira] [Comment Edited] (OFBIZ-11407) Upgrade Tomcat from 9.0.29 to 9.0.31 (CVE-2020-1938)
- [ofbiz-notifications] 20200228 [jira] [Comment Edited] (OFBIZ-11407) Upgrade Tomcat from 9.0.29 to 9.0.31 (CVE-2020-1938)
- [tomcat-dev] 20200625 svn commit: r1879208 - in /tomcat/site/trunk: docs/security-10.html docs/security-8.html docs/security-9.html xdocs/security-10.xml xdocs/security-8.xml xdocs/security-9.xml
- [tomcat-dev] 20200625 svn commit: r1879208 - in /tomcat/site/trunk: docs/security-10.html docs/security-8.html docs/security-9.html xdocs/security-10.xml xdocs/security-8.xml xdocs/security-9.xml
- [tomcat-users] 20200301 Re: [SECURITY] CVE-2020-1938 AJP Request Injection and potential Remote Code Execution
- [tomcat-users] 20200301 Re: [SECURITY] CVE-2020-1938 AJP Request Injection and potential Remote Code Execution
- [tomee-dev] 20200311 Re: CVE-2020-1938 on Tomcat 9.0.30 / TomEE 8.0.1
- [tomee-dev] 20200311 Re: CVE-2020-1938 on Tomcat 9.0.30 / TomEE 8.0.1
- [tomee-dev] 20200316 RE: CVE-2020-8840 on TomEE 8.0.1
- [tomee-dev] 20200316 RE: CVE-2020-8840 on TomEE 8.0.1
- [tomee-commits] 20200320 [jira] [Updated] (TOMEE-2789) TomEE plus(7.0.7) is affected by CVE-2020-1938(BDSA-2020-0339) vulnerability.
- [tomee-commits] 20200320 [jira] [Updated] (TOMEE-2789) TomEE plus(7.0.7) is affected by CVE-2020-1938(BDSA-2020-0339) vulnerability.
- [ofbiz-notifications] 20200228 [jira] [Commented] (OFBIZ-11407) Upgrade Tomcat from 9.0.29 to 9.0.31 (CVE-2020-1938)
- [ofbiz-notifications] 20200228 [jira] [Commented] (OFBIZ-11407) Upgrade Tomcat from 9.0.29 to 9.0.31 (CVE-2020-1938)
- [ofbiz-commits] 20200227 [ofbiz-plugins] branch release17.12 updated: Upgrade Tomcat from 9.0.29 to 9.0.31 (CVE-2020-1938) (OFBIZ-11407)
- [ofbiz-commits] 20200227 [ofbiz-plugins] branch release17.12 updated: Upgrade Tomcat from 9.0.29 to 9.0.31 (CVE-2020-1938) (OFBIZ-11407)
- [tomcat-users] 20200302 Re: [SECURITY] CVE-2020-1938 AJP Request Injection and potential Remote Code Execution
- [tomcat-users] 20200302 Re: [SECURITY] CVE-2020-1938 AJP Request Injection and potential Remote Code Execution
- [tomcat-users] 20200305 Aw: Re: Fix for CVE-2020-1938
- [tomcat-users] 20200305 Aw: Re: Fix for CVE-2020-1938
- [geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12
- [geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12
- [httpd-bugs] 20200319 [Bug 53098] mod_proxy_ajp: patch to set worker secret passed to tomcat
- [httpd-bugs] 20200319 [Bug 53098] mod_proxy_ajp: patch to set worker secret passed to tomcat
- [tomee-commits] 20200320 [jira] [Created] (TOMEE-2789) TomEE plus is affected by CVE-2020-1938(BDSA-2020-0339) vulnerability.
- [tomee-commits] 20200320 [jira] [Created] (TOMEE-2789) TomEE plus is affected by CVE-2020-1938(BDSA-2020-0339) vulnerability.
- [debian-lts-announce] 20200304 [SECURITY] [DLA 2133-1] tomcat7 security update
- [debian-lts-announce] 20200304 [SECURITY] [DLA 2133-1] tomcat7 security update
- [debian-lts-announce] 20200528 [SECURITY] [DLA 2209-1] tomcat8 security update
- [debian-lts-announce] 20200528 [SECURITY] [DLA 2209-1] tomcat8 security update
- FEDORA-2020-0e42878ba7
- FEDORA-2020-0e42878ba7
- FEDORA-2020-04ac174fa9
- FEDORA-2020-04ac174fa9
- FEDORA-2020-c870aa8378
- FEDORA-2020-c870aa8378
- GLSA-202003-43
- GLSA-202003-43
- https://security.netapp.com/advisory/ntap-20200226-0002/
- https://security.netapp.com/advisory/ntap-20200226-0002/
- DSA-4673
- DSA-4673
- DSA-4680
- DSA-4680
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
Modified: 2024-11-21
CVE-2022-25762
If a web application sends a WebSocket message concurrently with the WebSocket connection closing when running on Apache Tomcat 8.5.0 to 8.5.75 or Apache Tomcat 9.0.0.M1 to 9.0.20, it is possible that the application will continue to use the socket after it has been closed. The error handling triggered in this case could cause the a pooled object to be placed in the pool twice. This could result in subsequent connections using the same object concurrently which could result in data being returned to the wrong use and/or other errors.
- https://lists.apache.org/thread/6ckmjfb1k61dyzkto9vm2k5jvt4o7w7c
- https://lists.apache.org/thread/6ckmjfb1k61dyzkto9vm2k5jvt4o7w7c
- https://security.netapp.com/advisory/ntap-20220629-0003/
- https://security.netapp.com/advisory/ntap-20220629-0003/
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Closed bugs
Цепочка зависимостей, ведущая от freeipa-client к selinux-policy-alt
Package GraphicsMagick updated to version 1.3.35-alt1 for branch sisyphus in task 258561.
Closed vulnerabilities
BDU:2020-01594
Уязвимость функции WriteMATLABImage графического редактора GraphicsMagick, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2020-01869
Уязвимость функции WritePDBImage графического редактора GraphicsMagick, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
BDU:2020-01875
Уязвимость функции WriteXWDImage графического редактора GraphicsMagick, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
BDU:2020-01905
Уязвимость функции ReadMIFFImage графического редактора GraphicsMagick, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2020-01906
Уязвимость функции SVGStartElement графического редактора GraphicsMagick, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2020-02026
Уязвимость функции ReadMNGImage графического редактора GraphicsMagick, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее доступность
BDU:2020-02027
Уязвимость функции ReadXWDImage графического редактора GraphicsMagick, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2020-02028
Уязвимость функции ReadMPCImage графического редактора GraphicsMagick, связанная с ошибками управления ресурсом, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03283
Уязвимость реализации функции WritePDFImage графических редакторов ImageMagick и GraphicsMagick, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-03545
Уязвимость набора приложений командной строки для обработки файлов изображений GraphicsMagick, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-03601
Уязвимость функции HuffmanDecodeImage набора приложений командной строки для обработки файлов изображений GraphicsMagick, связанная с целочисленным переполнением, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-18544
There is a memory leak in the function WriteMSLImage of coders/msl.c in ImageMagick 7.0.8-13 Q16, and the function ProcessMSLScript of coders/msl.c in GraphicsMagick before 1.3.31.
- http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog
- http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog
- openSUSE-SU-2019:1141
- openSUSE-SU-2019:1141
- https://github.com/ImageMagick/ImageMagick/issues/1360
- https://github.com/ImageMagick/ImageMagick/issues/1360
- USN-4034-1
- USN-4034-1
Modified: 2024-11-21
CVE-2019-11005
In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a stack-based buffer overflow in the function SVGStartElement of coders/svg.c, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a quoted font family value.
- http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/b6fb77d7d54d
- http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/b6fb77d7d54d
- openSUSE-SU-2019:1272
- openSUSE-SU-2019:1272
- openSUSE-SU-2019:1295
- openSUSE-SU-2019:1295
- https://sourceforge.net/p/graphicsmagick/bugs/600/
- https://sourceforge.net/p/graphicsmagick/bugs/600/
- USN-4207-1
- USN-4207-1
- DSA-4640
- DSA-4640
Modified: 2024-11-21
CVE-2019-11006
In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the function ReadMIFFImage of coders/miff.c, which allows attackers to cause a denial of service or information disclosure via an RLE packet.
- http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/f7610c1281c1
- http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/f7610c1281c1
- openSUSE-SU-2019:1272
- openSUSE-SU-2019:1272
- openSUSE-SU-2019:1295
- openSUSE-SU-2019:1295
- [debian-lts-announce] 20190413 [SECURITY] [DLA 1755-1] graphicsmagick security update
- [debian-lts-announce] 20190413 [SECURITY] [DLA 1755-1] graphicsmagick security update
- https://sourceforge.net/p/graphicsmagick/bugs/598/
- https://sourceforge.net/p/graphicsmagick/bugs/598/
- USN-4207-1
- USN-4207-1
- DSA-4640
- DSA-4640
Modified: 2024-11-21
CVE-2019-11007
In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the ReadMNGImage function of coders/png.c, which allows attackers to cause a denial of service or information disclosure via an image colormap.
- http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/40fc71472b98
- http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/40fc71472b98
- http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/86a9295e7c83
- http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/86a9295e7c83
- openSUSE-SU-2019:1272
- openSUSE-SU-2019:1272
- openSUSE-SU-2019:1295
- openSUSE-SU-2019:1295
- openSUSE-SU-2019:1320
- openSUSE-SU-2019:1320
- openSUSE-SU-2019:1331
- openSUSE-SU-2019:1331
- [debian-lts-announce] 20190413 [SECURITY] [DLA 1755-1] graphicsmagick security update
- [debian-lts-announce] 20190413 [SECURITY] [DLA 1755-1] graphicsmagick security update
- https://sourceforge.net/p/graphicsmagick/bugs/596/
- https://sourceforge.net/p/graphicsmagick/bugs/596/
- USN-4207-1
- USN-4207-1
- DSA-4640
- DSA-4640
Modified: 2024-11-21
CVE-2019-11008
In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer overflow in the function WriteXWDImage of coders/xwd.c, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file.
- http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/d823d23a474b
- http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/d823d23a474b
- openSUSE-SU-2019:1272
- openSUSE-SU-2019:1272
- openSUSE-SU-2019:1295
- openSUSE-SU-2019:1295
- openSUSE-SU-2019:1320
- openSUSE-SU-2019:1320
- openSUSE-SU-2019:1331
- openSUSE-SU-2019:1331
- openSUSE-SU-2019:1354
- openSUSE-SU-2019:1354
- openSUSE-SU-2019:1355
- openSUSE-SU-2019:1355
- openSUSE-SU-2019:1437
- openSUSE-SU-2019:1437
- [debian-lts-announce] 20190413 [SECURITY] [DLA 1755-1] graphicsmagick security update
- [debian-lts-announce] 20190413 [SECURITY] [DLA 1755-1] graphicsmagick security update
- https://sourceforge.net/p/graphicsmagick/bugs/599/
- https://sourceforge.net/p/graphicsmagick/bugs/599/
- USN-4207-1
- USN-4207-1
- DSA-4640
- DSA-4640
Modified: 2024-11-21
CVE-2019-11009
In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the function ReadXWDImage of coders/xwd.c, which allows attackers to cause a denial of service or information disclosure via a crafted image file.
- http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/7cff2b1792de
- http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/7cff2b1792de
- openSUSE-SU-2019:1272
- openSUSE-SU-2019:1272
- openSUSE-SU-2019:1295
- openSUSE-SU-2019:1295
- openSUSE-SU-2019:1320
- openSUSE-SU-2019:1320
- openSUSE-SU-2019:1354
- openSUSE-SU-2019:1354
- openSUSE-SU-2019:1355
- openSUSE-SU-2019:1355
- openSUSE-SU-2019:1437
- openSUSE-SU-2019:1437
- [debian-lts-announce] 20190413 [SECURITY] [DLA 1755-1] graphicsmagick security update
- [debian-lts-announce] 20190413 [SECURITY] [DLA 1755-1] graphicsmagick security update
- https://sourceforge.net/p/graphicsmagick/bugs/597/
- https://sourceforge.net/p/graphicsmagick/bugs/597/
- USN-4207-1
- USN-4207-1
- DSA-4640
- DSA-4640
Modified: 2024-11-21
CVE-2019-11010
In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a memory leak in the function ReadMPCImage of coders/mpc.c, which allows attackers to cause a denial of service via a crafted image file.
- http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/a348d9661019
- http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/a348d9661019
- openSUSE-SU-2019:1272
- openSUSE-SU-2019:1272
- openSUSE-SU-2019:1295
- openSUSE-SU-2019:1295
- [debian-lts-announce] 20190413 [SECURITY] [DLA 1755-1] graphicsmagick security update
- [debian-lts-announce] 20190413 [SECURITY] [DLA 1755-1] graphicsmagick security update
- https://sourceforge.net/p/graphicsmagick/bugs/601/
- https://sourceforge.net/p/graphicsmagick/bugs/601/
- USN-4207-1
- USN-4207-1
- DSA-4640
- DSA-4640
Modified: 2024-11-21
CVE-2019-11505
In GraphicsMagick from version 1.3.8 to 1.4 snapshot-20190403 Q8, there is a heap-based buffer overflow in the function WritePDBImage of coders/pdb.c, which allows an attacker to cause a denial of service or possibly have unspecified other impact via a crafted image file. This is related to MagickBitStreamMSBWrite in magick/bit_stream.c.
- http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/85f5bdcd246a
- http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/85f5bdcd246a
- openSUSE-SU-2019:1354
- openSUSE-SU-2019:1354
- openSUSE-SU-2019:1355
- openSUSE-SU-2019:1355
- openSUSE-SU-2019:1437
- openSUSE-SU-2019:1437
- openSUSE-SU-2019:1603
- openSUSE-SU-2019:1603
- openSUSE-SU-2019:1683
- openSUSE-SU-2019:1683
- 108063
- 108063
- [debian-lts-announce] 20190520 [SECURITY] [DLA 1795-1] graphicsmagick security update
- [debian-lts-announce] 20190520 [SECURITY] [DLA 1795-1] graphicsmagick security update
- https://sourceforge.net/p/graphicsmagick/bugs/605/
- https://sourceforge.net/p/graphicsmagick/bugs/605/
- USN-4207-1
- USN-4207-1
- DSA-4640
- DSA-4640
Modified: 2024-11-21
CVE-2019-11506
In GraphicsMagick from version 1.3.30 to 1.4 snapshot-20190403 Q8, there is a heap-based buffer overflow in the function WriteMATLABImage of coders/mat.c, which allows an attacker to cause a denial of service or possibly have unspecified other impact via a crafted image file. This is related to ExportRedQuantumType in magick/export.c.
- http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/57ac0ae85e2a
- http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/57ac0ae85e2a
- openSUSE-SU-2019:1354
- openSUSE-SU-2019:1354
- openSUSE-SU-2019:1355
- openSUSE-SU-2019:1355
- openSUSE-SU-2019:1437
- openSUSE-SU-2019:1437
- openSUSE-SU-2019:1603
- openSUSE-SU-2019:1603
- openSUSE-SU-2019:1683
- openSUSE-SU-2019:1683
- [debian-lts-announce] 20190520 [SECURITY] [DLA 1795-1] graphicsmagick security update
- [debian-lts-announce] 20190520 [SECURITY] [DLA 1795-1] graphicsmagick security update
- https://sourceforge.net/p/graphicsmagick/bugs/604/
- https://sourceforge.net/p/graphicsmagick/bugs/604/
- USN-4207-1
- USN-4207-1
- DSA-4640
- DSA-4640
Modified: 2024-11-21
CVE-2019-12921
In GraphicsMagick before 1.3.32, the text filename component allows remote attackers to read arbitrary files via a crafted image because of TranslateTextEx for SVG.
- openSUSE-SU-2020:0416
- openSUSE-SU-2020:0416
- openSUSE-SU-2020:0429
- openSUSE-SU-2020:0429
- http://www.graphicsmagick.org/
- http://www.graphicsmagick.org/
- https://github.com/d0ge/data-processing/blob/master/CVE-2019-12921.md
- https://github.com/d0ge/data-processing/blob/master/CVE-2019-12921.md
- [debian-lts-announce] 20200321 [SECURITY] [DLA 2152-1] graphicsmagick security update
- [debian-lts-announce] 20200321 [SECURITY] [DLA 2152-1] graphicsmagick security update
- DSA-4675
- DSA-4675
Modified: 2024-11-21
CVE-2019-7397
In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in WritePDFImage in coders/pdf.c.
- http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
- openSUSE-SU-2019:1141
- openSUSE-SU-2019:1320
- 106847
- https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
- https://github.com/ImageMagick/ImageMagick/issues/1454
- USN-4034-1
- DSA-4712
- http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
- DSA-4712
- USN-4034-1
- https://github.com/ImageMagick/ImageMagick/issues/1454
- https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
- 106847
- openSUSE-SU-2019:1320
- openSUSE-SU-2019:1141
Modified: 2024-11-21
CVE-2020-10938
GraphicsMagick before 1.3.35 has an integer overflow and resultant heap-based buffer overflow in HuffmanDecodeImage in magick/compress.c.
- openSUSE-SU-2020:0416
- openSUSE-SU-2020:0429
- [debian-lts-announce] 20200415 [SECURITY] [DLA 2173-1] graphicsmagick security update
- https://sourceforge.net/p/graphicsmagick/code/ci/5b4dd7c6674140a115ec9424c8d19c6a458fac3e/
- DSA-4675
- openSUSE-SU-2020:0416
- DSA-4675
- https://sourceforge.net/p/graphicsmagick/code/ci/5b4dd7c6674140a115ec9424c8d19c6a458fac3e/
- [debian-lts-announce] 20200415 [SECURITY] [DLA 2173-1] graphicsmagick security update
- openSUSE-SU-2020:0429
Closed bugs
Добавить timerunit для systemd
Closed vulnerabilities
BDU:2021-00874
Уязвимость анализатора протокола BLIP программного обеспечения Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00875
Уязвимость программного обеспечения Wireshark, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю вызвать аварийное завершение работы приложения
BDU:2021-00884
Уязвимость функции в epan/dissectors/packet-tcp.c программного обеспечения Wireshark, позволяющая нарушителю вызвать аварийное завершение работы приложения
Modified: 2024-11-21
CVE-2020-25862
In Wireshark 3.2.0 to 3.2.6, 3.0.0 to 3.0.13, and 2.6.0 to 2.6.20, the TCP dissector could crash. This was addressed in epan/dissectors/packet-tcp.c by changing the handling of the invalid 0xFFFF checksum.
- openSUSE-SU-2020:1878
- openSUSE-SU-2020:1878
- openSUSE-SU-2020:1882
- openSUSE-SU-2020:1882
- https://gitlab.com/wireshark/wireshark/-/commit/7f3fe6164a68b76d9988c4253b24d43f498f1753
- https://gitlab.com/wireshark/wireshark/-/commit/7f3fe6164a68b76d9988c4253b24d43f498f1753
- https://gitlab.com/wireshark/wireshark/-/issues/16816
- https://gitlab.com/wireshark/wireshark/-/issues/16816
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- FEDORA-2020-1bf4b97c16
- FEDORA-2020-1bf4b97c16
- FEDORA-2020-1b390bec14
- FEDORA-2020-1b390bec14
- FEDORA-2020-9bda6ae1cd
- FEDORA-2020-9bda6ae1cd
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.wireshark.org/security/wnpa-sec-2020-12.html
- https://www.wireshark.org/security/wnpa-sec-2020-12.html
Modified: 2024-11-21
CVE-2020-25863
In Wireshark 3.2.0 to 3.2.6, 3.0.0 to 3.0.13, and 2.6.0 to 2.6.20, the MIME Multipart dissector could crash. This was addressed in epan/dissectors/packet-multipart.c by correcting the deallocation of invalid MIME parts.
- openSUSE-SU-2020:1878
- openSUSE-SU-2020:1878
- openSUSE-SU-2020:1882
- openSUSE-SU-2020:1882
- https://gitlab.com/wireshark/wireshark/-/commit/5803c7b87b3414cdb8bf502af50bb406ca774482
- https://gitlab.com/wireshark/wireshark/-/commit/5803c7b87b3414cdb8bf502af50bb406ca774482
- https://gitlab.com/wireshark/wireshark/-/issues/16741
- https://gitlab.com/wireshark/wireshark/-/issues/16741
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- FEDORA-2020-1bf4b97c16
- FEDORA-2020-1bf4b97c16
- FEDORA-2020-1b390bec14
- FEDORA-2020-1b390bec14
- FEDORA-2020-9bda6ae1cd
- FEDORA-2020-9bda6ae1cd
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.wireshark.org/security/wnpa-sec-2020-11.html
- https://www.wireshark.org/security/wnpa-sec-2020-11.html
Modified: 2024-11-21
CVE-2020-25866
In Wireshark 3.2.0 to 3.2.6 and 3.0.0 to 3.0.13, the BLIP protocol dissector has a NULL pointer dereference because a buffer was sized for compressed (not uncompressed) messages. This was addressed in epan/dissectors/packet-blip.c by allowing reasonable compression ratios and rejecting ZIP bombs.
- openSUSE-SU-2020:1878
- openSUSE-SU-2020:1878
- openSUSE-SU-2020:1882
- openSUSE-SU-2020:1882
- https://gitlab.com/wireshark/wireshark/-/commit/4a948427100b6c109f4ec7b4361f0d2aec5e5c3f
- https://gitlab.com/wireshark/wireshark/-/commit/4a948427100b6c109f4ec7b4361f0d2aec5e5c3f
- https://gitlab.com/wireshark/wireshark/-/issues/16866
- https://gitlab.com/wireshark/wireshark/-/issues/16866
- FEDORA-2020-1bf4b97c16
- FEDORA-2020-1bf4b97c16
- FEDORA-2020-1b390bec14
- FEDORA-2020-1b390bec14
- FEDORA-2020-9bda6ae1cd
- FEDORA-2020-9bda6ae1cd
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.wireshark.org/security/wnpa-sec-2020-13.html
- https://www.wireshark.org/security/wnpa-sec-2020-13.html
Package claws-mail updated to version 3.17.7-alt1 for branch sisyphus in task 258942.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-16094
In imap_scan_tree_recursive in Claws Mail through 3.17.6, a malicious IMAP server can trigger stack consumption because of unlimited recursion into subdirectories during a rebuild of the folder tree.