Bug 27739 - tomcat new security issue CVE-2020-17527
Summary: tomcat new security issue CVE-2020-17527
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 7
Hardware: All Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA7-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2020-12-04 13:42 CET by David Walser
Modified: 2021-01-10 20:47 CET (History)
5 users (show)

See Also:
Source RPM: tomcat-9.0.38-1.mga7.src.rpm
CVE: CVE-2020-17527
Status comment:


Attachments

Description David Walser 2020-12-04 13:42:18 CET
Apache has issued an advisory on December 3:
https://www.openwall.com/lists/oss-security/2020/12/03/3

The issue is fixed upstream in 9.0.40.

Mageia 7 is also affected.
David Walser 2020-12-04 13:42:43 CET

CC: (none) => geiger.david68210
Whiteboard: (none) => MGA7TOO

Comment 1 David Walser 2020-12-06 02:11:39 CET
Fedora has issued an advisory for this today (December 5):
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/VLNRDHJJDZSUJSOSLSHLENY4YUFCYK46/
Comment 2 David GEIGER 2020-12-06 10:22:45 CET
Fixed for Cauldron but doesn't build on mga7!
Comment 3 David Walser 2020-12-06 16:56:43 CET
tomcat-9.0.40-1.mga8 uploaded for Cauldron.

Version: Cauldron => 7
Whiteboard: MGA7TOO => (none)

Comment 5 David Walser 2020-12-09 22:16:13 CET
I wonder if 9.0.41 fixes it:
http://tomcat.apache.org/tomcat-9.0-doc/changelog.html#Tomcat_9.0.41_(markt)
Comment 7 David Walser 2020-12-22 17:48:40 CET
Patched package uploaded for Mageia 7 by David.

Advisory:
========================

Updated tomcat packages fix security vulnerability:

While investigating Apache issue 64830 it was discovered that Apache Tomcat
could re-use an HTTP request header value from the previous stream received on
an HTTP/2 connection for the request associated with the subsequent stream.
While this would most likely lead to an error and the closure of the HTTP/2
connection, it is possible that information could leak between requests
(CVE-2020-17527).

The tomcat package has been updated to version 9.0.39, and patched to fix
this issue.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17527
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40
========================

Updated packages in core/updates_testing:
========================
tomcat-9.0.39-1.mga7
tomcat-admin-webapps-9.0.39-1.mga7
tomcat-docs-webapp-9.0.39-1.mga7
tomcat-jsvc-9.0.39-1.mga7
tomcat-jsp-2.3-api-9.0.39-1.mga7
tomcat-lib-9.0.39-1.mga7
tomcat-servlet-4.0-api-9.0.39-1.mga7
tomcat-el-3.0-api-9.0.39-1.mga7
tomcat-webapps-9.0.39-1.mga7

from tomcat-9.0.39-1.mga7.src.rpm

Assignee: java => qa-bugs

Comment 8 Brian Rockwell 2021-01-08 18:18:21 CET
# uname -a
Linux linux.local 5.7.19-desktop-3.mga7 #1 SMP Sun Oct 18 15:46:00 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux

The following 20 packages are going to be installed:

- apache-commons-daemon-1.0.15-16.mga7.x86_64
- apache-commons-daemon-jsvc-1.0.15-16.mga7.x86_64
- ecj-4.10-1.mga7.noarch
- lib64apr-devel-1.7.0-1.mga7.x86_64
- lib64apr1_0-1.7.0-1.mga7.x86_64
- lib64openssl-devel-1.1.0l-1.2.mga7.x86_64
- lib64uuid-devel-2.33.2-1.mga7.x86_64
- libtool-2.4.6-9.mga7.x86_64
- libtool-base-2.4.6-9.mga7.x86_64
- tomcat-9.0.39-1.mga7.noarch
- tomcat-admin-webapps-9.0.39-1.mga7.noarch
- tomcat-docs-webapp-9.0.39-1.mga7.noarch
- tomcat-el-3.0-api-9.0.39-1.mga7.noarch
- tomcat-jsp-2.3-api-9.0.39-1.mga7.noarch
- tomcat-jsvc-9.0.39-1.mga7.noarch
- tomcat-lib-9.0.39-1.mga7.noarch
- tomcat-native-1.2.23-1.mga7.x86_64
- tomcat-servlet-4.0-api-9.0.39-1.mga7.noarch
- tomcat-taglibs-standard-1.2.5-4.mga7.noarch
- tomcat-webapps-9.0.39-1.mga7.noarch

30MB of additional disk space will be used.

13MB of packages will be retrieved.

---

update tomcat-users.xml and restarted the services

---

able to work in admin module without issues.

works as designed.

Whiteboard: (none) => MGA7-64-OK
CC: (none) => brtians1

Comment 9 Thomas Andrews 2021-01-08 23:13:06 CET
Validating. Advisory in Comment 7.

CC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => validated_update

Comment 10 Aurelien Oudelet 2021-01-10 18:34:59 CET
Advisory pushed to SVN.

CVE: (none) => CVE-2020-17527
CC: (none) => ouaurelien
Keywords: (none) => advisory

Comment 11 Mageia Robot 2021-01-10 20:47:50 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2021-0020.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.