[USN-6943-1] Tomcat vulnerabilities
[USN-6909-2] Bind vulnerabilities
[USN-6943-1] Tomcat vulnerabilities
==========================================================================
Ubuntu Security Notice USN-6943-1
August 01, 2024
tomcat8, tomcat9 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Tomcat.
Software Description:
- tomcat9: Servlet and JSP engine
- tomcat8: Servlet and JSP engine
Details:
It was discovered that Tomcat incorrectly handled certain uncommon
PersistenceManager with FileStore configurations. A remote attacker could
possibly use this issue to execute arbitrary code. This issue only affected
tomcat8 for Ubuntu 18.04 LTS (CVE-2020-9484)
It was discovered that Tomcat incorrectly handled certain HTTP/2 connection
requests. A remote attacker could use this issue to obtain wrong responses
possibly containing sensitive information. This issue only affected tomcat8
for Ubuntu 18.04 LTS (CVE-2021-25122)
Thomas Wozenilek discovered that Tomcat incorrectly handled certain TLS
packets. A remote attacker could possibly use this issue to cause a denial
of service. This issue only affected tomcat8 for Ubuntu 18.04 LTS
(CVE-2021-41079)
Trung Pham discovered that a race condition existed in Tomcat when handling
session files with FileStore. A remote attacker could possibly use this
issue to execute arbitrary code. This issue affected tomcat8 for Ubuntu
16.04 LTS and Ubuntu 18.04 LTS, and tomcat9 for Ubuntu 18.04 LTS and Ubuntu
20.04 LTS (CVE-2022-23181)
It was discovered that Tomcat's documentation incorrectly stated that
EncryptInterceptor provided availability protection when running over an
untrusted network. A remote attacker could possibly use this issue to cause
a denial of service even if EncryptInterceptor was being used. This issue
affected tomcat8 for Ubuntu 18.04 LTS, and tomcat9 for Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS (CVE-2022-29885)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
tomcat9-docs 9.0.58-1ubuntu0.1+esm2
Available with Ubuntu Pro
Ubuntu 20.04 LTS
libtomcat9-java 9.0.31-1ubuntu0.6
tomcat9 9.0.31-1ubuntu0.6
tomcat9-docs 9.0.31-1ubuntu0.6
Ubuntu 18.04 LTS
libtomcat8-java 8.5.39-1ubuntu1~18.04.3+esm2
Available with Ubuntu Pro
libtomcat9-java 9.0.16-3ubuntu0.18.04.2+esm2
Available with Ubuntu Pro
tomcat8 8.5.39-1ubuntu1~18.04.3+esm2
Available with Ubuntu Pro
tomcat8-docs 8.5.39-1ubuntu1~18.04.3+esm2
Available with Ubuntu Pro
tomcat9 9.0.16-3ubuntu0.18.04.2+esm2
Available with Ubuntu Pro
tomcat9-docs 9.0.16-3ubuntu0.18.04.2+esm2
Available with Ubuntu Pro
Ubuntu 16.04 LTS
libtomcat8-java 8.0.32-1ubuntu1.13+esm1
Available with Ubuntu Pro
tomcat8 8.0.32-1ubuntu1.13+esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6943-1
CVE-2020-9484, CVE-2021-25122, CVE-2021-41079, CVE-2022-23181,
CVE-2022-29885
Package Information:
https://launchpad.net/ubuntu/+source/tomcat9/9.0.31-1ubuntu0.6
-
[USN-6909-2] Bind vulnerabilities
==========================================================================
Ubuntu Security Notice USN-6909-2
August 01, 2024
bind9 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in Bind.
Software Description:
- bind9: Internet Domain Name Server
Details:
USN-6909-1 fixed several vulnerabilities in Bind. This update provides
the corresponding update for Ubuntu 18.04 LTS.
Original advisory details:
Toshifumi Sakaguchi discovered that Bind incorrectly handled having a very
large number of RRs existing at the same time. A remote attacker could
possibly use this issue to cause Bind to consume resources, leading to a
denial of service. (CVE-2024-1737)
It was discovered that Bind incorrectly handled a large number of SIG(0)
signed requests. A remote attacker could possibly use this issue to cause
Bind to consume resources, leading to a denial of service. (CVE-2024-1975)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS
bind9 1:9.11.3+dfsg-1ubuntu1.19+esm4
Available with Ubuntu Pro
This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.
References:
https://ubuntu.com/security/notices/USN-6909-2
https://ubuntu.com/security/notices/USN-6909-1
CVE-2024-1737, CVE-2024-1975