Debian 10226 Published by

A tomcat8 security update has been released for Debian GNU/Linux 8 Extended LTS to address an issue where an attacker can bypass some of the protection provided by the LockOut Realm.



ELA-475-1 tomcat8 security update

Package tomcat8
Version 8.0.14-1+deb8u22
Related CVEs CVE-2021-30640 CVE-2021-33037

Several security vulnerabilities have been discovered in the Tomcat servlet and JSP engine.

CVE-2021-30640

A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to
authenticate using variations of a valid user name and/or to bypass some of
the protection provided by the LockOut Realm.

CVE-2021-33037

Apache Tomcat did not correctly parse the HTTP transfer-encoding request
header in some circumstances leading to the possibility to request
smuggling when used with a reverse proxy. Specifically: - Tomcat
incorrectly ignored the transfer encoding header if the client declared it
would only accept an HTTP/1.0 response; - Tomcat honoured the identify
encoding; and - Tomcat did not ensure that, if present, the chunked
encoding was the final encoding.
For Debian 8 jessie, these problems have been fixed in version 8.0.14-1+deb8u22.

We recommend that you upgrade your tomcat8 packages.

Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/

  ELA-475-1 tomcat8 security update