Bug 19306 - tomcat (tomcat7) new security issue CVE-2016-5388
Summary: tomcat (tomcat7) new security issue CVE-2016-5388
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 5
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/699807/
Whiteboard: has_procedure MGA5-32-OK advisory
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2016-09-07 19:58 CEST by David Walser
Modified: 2016-09-21 22:39 CEST (History)
4 users (show)

See Also:
Source RPM: tomcat-7.0.68-1.1.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2016-09-07 19:58:47 CEST
openSUSE has issued an advisory on September 6:
http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html

This is another "httpoxy" issue.  It may be fixed in our package already; I'm not sure.  I also don't know if tomcat7 (Mageia 5) is affected.
Comment 1 Marja Van Waes 2016-09-08 11:13:11 CEST
Assigning to maintainer

CC: (none) => marja11
Assignee: bugsquad => mageia

Comment 2 David Walser 2016-09-09 18:55:37 CEST
David found the fix.  Cauldron updated.  Mageia 5 patched.

Testing procedure:
https://bugs.mageia.org/show_bug.cgi?id=8307#c17

Advisory:
========================

Updated tomcat packages fix security vulnerability:

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875
section 4.1.18 and therefore does not protect applications from the presence of
untrusted client data in the HTTP_PROXY environment variable, which might allow
remote attackers to redirect an application's outbound HTTP traffic to an
arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an
"httpoxy" issue (CVE-2016-5388).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5388
http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html
========================

Updated packages in core/updates_testing:
========================
tomcat-7.0.68-1.2.mga5
tomcat-admin-webapps-7.0.68-1.2.mga5
tomcat-docs-webapp-7.0.68-1.2.mga5
tomcat-javadoc-7.0.68-1.2.mga5
tomcat-jsvc-7.0.68-1.2.mga5
tomcat-jsp-2.2-api-7.0.68-1.2.mga5
tomcat-lib-7.0.68-1.2.mga5
tomcat-servlet-3.0-api-7.0.68-1.2.mga5
tomcat-el-2.2-api-7.0.68-1.2.mga5
tomcat-webapps-7.0.68-1.2.mga5

from tomcat-7.0.68-1.2.mga5.src.rpm

Version: Cauldron => 5
Assignee: mageia => qa-bugs
Summary: tomcat new security issue CVE-2016-5388 => tomcat (tomcat7) new security issue CVE-2016-5388
Source RPM: tomcat-8.0.36-1.mga6.src.rpm => tomcat-7.0.68-1.1.mga5.src.rpm
Whiteboard: (none) => has_procedure

Comment 3 Dave Hodgins 2016-09-12 01:28:48 CEST
Installed and configured, and confirmed tomcat working as per bug 8307.
Installed the updates, and restarted tomcat. After that
http://localhost:8080/sample/hello works, but
http://localhost:8080/examples returns a 404, as does http://localhost:8080

CC: (none) => davidwhodgins
Whiteboard: has_procedure => has_procedure feedback

Comment 4 David Walser 2016-09-12 01:58:11 CEST
David, do you have any idea?  This 404 error doesn't look like it should be happening because of the patch.

CC: (none) => geiger.david68210

Comment 5 Dave Hodgins 2016-09-12 06:23:54 CEST
Found it. Had to add the closing --> to line 357 of /etc/tomcat/web.xml,
the last line added in the changes to the file.
Comment 6 David GEIGER 2016-09-12 10:04:01 CEST
Wow!! my bad :(

A typo when I had rebased the upstream patch.

Thanks Dave to pointing that out, so should be fixed now for mga5.
Comment 7 David Walser 2016-09-12 16:41:37 CEST
Updated packages in core/updates_testing:
========================
tomcat-7.0.68-1.3.mga5
tomcat-admin-webapps-7.0.68-1.3.mga5
tomcat-docs-webapp-7.0.68-1.3.mga5
tomcat-javadoc-7.0.68-1.3.mga5
tomcat-jsvc-7.0.68-1.3.mga5
tomcat-jsp-2.2-api-7.0.68-1.3.mga5
tomcat-lib-7.0.68-1.3.mga5
tomcat-servlet-3.0-api-7.0.68-1.3.mga5
tomcat-el-2.2-api-7.0.68-1.3.mga5
tomcat-webapps-7.0.68-1.3.mga5

from tomcat-7.0.68-1.3.mga5.src.rpm

Whiteboard: has_procedure feedback => has_procedure

Comment 8 Dave Hodgins 2016-09-13 01:34:19 CEST
Fixed now. Validating. Thanks.

Keywords: (none) => validated_update
Whiteboard: has_procedure => has_procedure MGA5-32-OK advisory
CC: (none) => sysadmin-bugs

Comment 9 Mageia Robot 2016-09-21 22:39:25 CEST
An update for this issue has been pushed to the Mageia Updates repository.

http://advisories.mageia.org/MGASA-2016-0312.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.