[ubuntu/questing-proposed] tomcat9 9.0.70-2ubuntu3 (Accepted)

Vyom Yadav vyom.yadav at canonical.com
Mon Jun 9 14:15:22 UTC 2025


tomcat9 (9.0.70-2ubuntu3) questing; urgency=medium

  * SECURITY UPDATE: Information disclosure via missing secure attribute
    - debian/patches/CVE-2023-28708.patch: Fix BZ 66471 - JSessionId
      secure attribute missing with RemoteIpFilter and X-Forwarded-Proto
      set to https
    - CVE-2023-28708
  * SECURITY UPDATE: Information disclosure via incomplete cleanup
    - debian/patches/CVE-2023-42795.patch: Improve handling of failures
      during recycle() methods
    - CVE-2023-42795
  * SECURITY UPDATE: HTTP request smuggling via trailer headers
    - debian/patches/CVE-2023-45648.patch: Align processing of trailer
      headers with standard processing
    - CVE-2023-45648
  * SECURITY UPDATE: Denial of service via WebSocket connections
    - debian/patches/CVE-2024-23672-pre-1.patch: Rename prior to
      extending with additional tests
    - debian/patches/CVE-2024-23672-pre-2.patch: Add test util getter
      for root context with class path scanning disabled
    - debian/patches/CVE-2024-23672.patch: Refactor WebSocket close for
      suspend/resume
    - CVE-2024-23672
  * SECURITY UPDATE: Denial of service via HTTP/2 header parsing
    - debian/patches/CVE-2024-24549.patch: Report HTTP/2 header parsing
      errors earlier
    - debian/patches/CVE-2024-24549-post-1.patch: Make recycled streams
      eligible for GC immediately. Improves scalability.
    - debian/patches/CVE-2024-24549-post-2.patch: Update tests after
      HTTP/2 improvements
    - CVE-2024-24549
  * SECURITY UPDATE: Denial of service via HTTP/2 stream handling
    - debian/patches/CVE-2024-34750-pre-1.patch: Fix 66530 - Regression
      in fix for BZ 66442. Ensure count is decremented
    - debian/patches/CVE-2024-34750-pre-2.patch: Refactor decrement
      using a common method
    - debian/patches/CVE-2024-34750.patch: Make counting of active
      streams more robust
    - CVE-2024-34750
  * SECURITY UPDATE: Denial of service via TLS handshake abuse
    - debian/patches/CVE-2024-38286.patch: Add support for re-keying
      with TLS 1.3
    - CVE-2024-38286

Date: Mon, 09 Jun 2025 16:07:45 +0530
Changed-By: Vyom Yadav <vyom.yadav at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/tomcat9/9.0.70-2ubuntu3
-------------- next part --------------
Format: 1.8
Date: Mon, 09 Jun 2025 16:07:45 +0530
Source: tomcat9
Built-For-Profiles: noudeb
Architecture: source
Version: 9.0.70-2ubuntu3
Distribution: questing
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Vyom Yadav <vyom.yadav at canonical.com>
Changes:
 tomcat9 (9.0.70-2ubuntu3) questing; urgency=medium
 .
   * SECURITY UPDATE: Information disclosure via missing secure attribute
     - debian/patches/CVE-2023-28708.patch: Fix BZ 66471 - JSessionId
       secure attribute missing with RemoteIpFilter and X-Forwarded-Proto
       set to https
     - CVE-2023-28708
   * SECURITY UPDATE: Information disclosure via incomplete cleanup
     - debian/patches/CVE-2023-42795.patch: Improve handling of failures
       during recycle() methods
     - CVE-2023-42795
   * SECURITY UPDATE: HTTP request smuggling via trailer headers
     - debian/patches/CVE-2023-45648.patch: Align processing of trailer
       headers with standard processing
     - CVE-2023-45648
   * SECURITY UPDATE: Denial of service via WebSocket connections
     - debian/patches/CVE-2024-23672-pre-1.patch: Rename prior to
       extending with additional tests
     - debian/patches/CVE-2024-23672-pre-2.patch: Add test util getter
       for root context with class path scanning disabled
     - debian/patches/CVE-2024-23672.patch: Refactor WebSocket close for
       suspend/resume
     - CVE-2024-23672
   * SECURITY UPDATE: Denial of service via HTTP/2 header parsing
     - debian/patches/CVE-2024-24549.patch: Report HTTP/2 header parsing
       errors earlier
     - debian/patches/CVE-2024-24549-post-1.patch: Make recycled streams
       eligible for GC immediately. Improves scalability.
     - debian/patches/CVE-2024-24549-post-2.patch: Update tests after
       HTTP/2 improvements
     - CVE-2024-24549
   * SECURITY UPDATE: Denial of service via HTTP/2 stream handling
     - debian/patches/CVE-2024-34750-pre-1.patch: Fix 66530 - Regression
       in fix for BZ 66442. Ensure count is decremented
     - debian/patches/CVE-2024-34750-pre-2.patch: Refactor decrement
       using a common method
     - debian/patches/CVE-2024-34750.patch: Make counting of active
       streams more robust
     - CVE-2024-34750
   * SECURITY UPDATE: Denial of service via TLS handshake abuse
     - debian/patches/CVE-2024-38286.patch: Add support for re-keying
       with TLS 1.3
     - CVE-2024-38286
Checksums-Sha1:
 2d2ccc12c5ad7336b0ab1ddbf7ac1ddfb98dfac6 2424 tomcat9_9.0.70-2ubuntu3.dsc
 b1d24c5ed67b352045371d2232787820d2933204 49128 tomcat9_9.0.70-2ubuntu3.debian.tar.xz
 91f3ed89639141e01966fae421232ed77e9c8fc9 15529 tomcat9_9.0.70-2ubuntu3_source.buildinfo
Checksums-Sha256:
 59f12f401ef975a0c4c365a944ba4c69d863659b6b35ec95d7b98bd045b68f8a 2424 tomcat9_9.0.70-2ubuntu3.dsc
 06b0fced051342b971a25ef59d39f4a71cebe60dd204094f34d367ee45acfcea 49128 tomcat9_9.0.70-2ubuntu3.debian.tar.xz
 c8a6e24a75a8a2b110b263d2ef86b636bd8d7a3056042e796a66c4eed871bf44 15529 tomcat9_9.0.70-2ubuntu3_source.buildinfo
Files:
 4bb48bb01f28926f7864273bd5a62ba8 2424 java optional tomcat9_9.0.70-2ubuntu3.dsc
 3ea8afba5acc1ec38a2e9e871b3429ac 49128 java optional tomcat9_9.0.70-2ubuntu3.debian.tar.xz
 cdcea5981069c427373cec7a05524bed 15529 java optional tomcat9_9.0.70-2ubuntu3_source.buildinfo
Original-Maintainer: Debian Java Maintainers <pkg-java-maintainers at lists.alioth.debian.org>


More information about the Questing-changes mailing list