Gentoo Archives: gentoo-announce

From: Aaron Bauman <bman@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 202006-21 ] Apache Tomcat: Remote code execution
Date: Mon, 15 Jun 2020 18:25:07
Message-Id: 20200615155610.GJ17996@bubba
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 202006-21
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Apache Tomcat: Remote code execution
9 Date: June 15, 2020
10 Bugs: #724344
11 ID: 202006-21
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A vulnerability has been discovered in Apache Tomcat which could result
19 in the arbitrary execution of code.
20
21 Background
22 ==========
23
24 Apache Tomcat is a Servlet-3.0/JSP-2.2 Container.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 www-servers/tomcat < 7.0.104:7 >= 7.0.104:7
33 < 8.5.55:8.5 >= 8.5.55:8.5
34
35 Description
36 ===========
37
38 Apache Tomcat improperly handles deserialization of files under
39 specific circumstances.
40
41 Impact
42 ======
43
44 A remote attacker could possibly execute arbitrary code with the
45 privileges of the process, or cause a Denial of Service condition.
46
47 Workaround
48 ==========
49
50 There is no known workaround at this time.
51
52 Resolution
53 ==========
54
55 All Apache Tomcat 7.x users should upgrade to the latest version:
56
57 # emerge --sync
58 # emerge --ask --oneshot --verbose ">=www-servers/tomcat-7.0.104"
59
60 All Apache Tomcat 8.x users should upgrade to the latest version:
61
62 # emerge --sync
63 # emerge --ask --oneshot --verbose ">=www-servers/tomcat-8.5.55"
64
65 References
66 ==========
67
68 [ 1 ] CVE-2020-9484
69 https://nvd.nist.gov/vuln/detail/CVE-2020-9484
70 [ 2 ] Upstream advisory (7)
71 https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.104
72 [ 3 ] Upstream advisory (8.5)
73 https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.55
74
75 Availability
76 ============
77
78 This GLSA and any updates to it are available for viewing at
79 the Gentoo Security Website:
80
81 https://security.gentoo.org/glsa/202006-21
82
83 Concerns?
84 =========
85
86 Security is a primary focus of Gentoo Linux and ensuring the
87 confidentiality and security of our users' machines is of utmost
88 importance to us. Any security concerns should be addressed to
89 security@g.o or alternatively, you may file a bug at
90 https://bugs.gentoo.org.
91
92 License
93 =======
94
95 Copyright 2020 Gentoo Foundation, Inc; referenced text
96 belongs to its owner(s).
97
98 The contents of this document are licensed under the
99 Creative Commons - Attribution / Share Alike license.
100
101 https://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature