File _patchinfo of Package patchinfo.6918

<patchinfo incident="6918">
  <issue id="1082480" tracker="bnc">VUL-0: CVE-2018-1304: tomcat: Incorrect handling of empty string URL in security constraints can lead to unitended exposure of resources</issue>
  <issue id="1082481" tracker="bnc">VUL-0: CVE-2018-1305: tomcat: Late application of security constraints can lead to resource exposure for unauthorised users</issue>
  <issue id="1078677" tracker="bnc">VUL-1: CVE-2017-15706: tomcat: Incorrect documentation of CGI Servlet search algorithm may lead to misconfiguration</issue>
  <issue id="1102379" tracker="bnc">VUL-0: CVE-2018-8034: tomcat: host name verification missing in WebSocket client</issue>
  <issue id="1102400" tracker="bnc">VUL-0: CVE-2018-1336: tomcat: A bug in the UTF-8 decoder can lead to DoS</issue>
  <issue id="1102410" tracker="bnc">VUL-0: CVE-2018-8037: tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up</issue>
  <issue id="1093697" tracker="bnc">VUL-1: CVE-2018-8014: tomcat: The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'supportsCredentials'</issue>
  <issue id="1110850" tracker="bnc">VUL-0: CVE-2018-11784: tomcat6,tomcat5,tomcat: specially crafted URL could be used to cause a redirect to any URI of the attackers choice</issue>
  <issue id="2018-8014" tracker="cve" />
  <issue id="2018-1336" tracker="cve" />
  <issue id="2018-8034" tracker="cve" />
  <issue id="2018-8037" tracker="cve" />
  <issue id="2017-15706" tracker="cve" />
  <issue id="2018-1305" tracker="cve" />
  <issue id="2018-1304" tracker="cve" />
  <issue id="2018-11784" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>mateialbu</packager>
  <description>This update for tomcat to version 8.0.53 fixes the following security issues:

- CVE-2018-11784: When the default servlet in Apache Tomcat returned
  a redirect to a directory (e.g. redirecting to '/foo/' when the user
  requested '/foo') a specially crafted URL could be used to cause the
  redirect to be generated to any URI of the attackers choice. (bsc#1110850)
- CVE-2018-1336: An improper handing of overflow in the UTF-8 decoder with
  supplementary characters could have lead to an infinite loop in the decoder
  causing a Denial of Service (bsc#1102400)
- CVE-2018-8034: The host name verification when using TLS with the WebSocket
  client was missing. It is now enabled by default (bsc#1102379)
- CVE-2018-8037: If an async request was completed by the application at the
  same time as the container triggered the async timeout, a race condition
  existed that could have resulted in a user seeing a response intended for a
  different user. An additional issue was present in the NIO and NIO2 connectors
  that did not correctly track the closure of the connection when an async
  request was completed by the application and timed out by the container at the
  same time. This could also have resulted in a user seeing a response intended
  for another user (bsc#1102410)
- CVE-2018-1305: Fixed late application of security constraints that can lead
  to resource exposure for unauthorised users (bsc#1082481).
- CVE-2018-1304: Fixed incorrect handling of empty string URL in security
  constraints that can lead to unitended exposure of resources (bsc#1082480).
- CVE-2017-15706: Fixed incorrect documentation of CGI Servlet search algorithm
  that may lead to misconfiguration (bsc#1078677).
- CVE-2018-8014: The defaults settings for the CORS filter were insecure and
  enable 'supportsCredentials' for all origins (bsc#1093697).
</description>
  <summary>Security update for tomcat</summary>
</patchinfo>
openSUSE Build Service is sponsored by