forked from pool/tomcat
Accepting request 928113 from home:mbussolotto:branches:Java:packages
- Fixed CVEs: * CVE-2021-30640: Escape parameters in JNDI Realm queries (bsc#1188279) * CVE-2021-33037: Process T-E header from both HTTP 1.0 and HTTP 1.1. clients (bsc#1188278) * CVE-2021-41079: Validate incoming TLS packet (bsc#1190558) - Added patches: * tomcat-9.0-CVE-2021-30640.patch * tomcat-9.0-CVE-2021-33037.patch * tomcat-9.0-CVE-2021-41079.patch OBS-URL: https://build.opensuse.org/request/show/928113 OBS-URL: https://build.opensuse.org/package/show/Java:packages/tomcat?expand=0&rev=229
This commit is contained in:
parent
45332d7d33
commit
eb7ec9843b
2666
tomcat-9.0-CVE-2021-30640.patch
Normal file
2666
tomcat-9.0-CVE-2021-30640.patch
Normal file
File diff suppressed because it is too large
Load Diff
195
tomcat-9.0-CVE-2021-33037.patch
Normal file
195
tomcat-9.0-CVE-2021-33037.patch
Normal file
@ -0,0 +1,195 @@
|
||||
Index: apache-tomcat-9.0.43-src/java/org/apache/coyote/http11/Http11Processor.java
|
||||
===================================================================
|
||||
--- apache-tomcat-9.0.43-src.orig/java/org/apache/coyote/http11/Http11Processor.java
|
||||
+++ apache-tomcat-9.0.43-src/java/org/apache/coyote/http11/Http11Processor.java
|
||||
@@ -212,11 +212,8 @@ public class Http11Processor extends Abs
|
||||
|
||||
// Parsing trims and converts to lower case.
|
||||
|
||||
- if (encodingName.equals("identity")) {
|
||||
- // Skip
|
||||
- } else if (encodingName.equals("chunked")) {
|
||||
- inputBuffer.addActiveFilter
|
||||
- (inputFilters[Constants.CHUNKED_FILTER]);
|
||||
+ if (encodingName.equals("chunked")) {
|
||||
+ inputBuffer.addActiveFilter(inputFilters[Constants.CHUNKED_FILTER]);
|
||||
contentDelimitation = true;
|
||||
} else {
|
||||
for (int i = pluggableFilterIndex; i < inputFilters.length; i++) {
|
||||
@@ -753,13 +750,14 @@ public class Http11Processor extends Abs
|
||||
InputFilter[] inputFilters = inputBuffer.getFilters();
|
||||
|
||||
// Parse transfer-encoding header
|
||||
- if (http11) {
|
||||
+ // HTTP specs say an HTTP 1.1 server should accept any recognised
|
||||
+ // HTTP 1.x header from a 1.x client unless the specs says otherwise.
|
||||
+ if (!http09) {
|
||||
MessageBytes transferEncodingValueMB = headers.getValue("transfer-encoding");
|
||||
if (transferEncodingValueMB != null) {
|
||||
List<String> encodingNames = new ArrayList<>();
|
||||
if (TokenList.parseTokenList(headers.values("transfer-encoding"), encodingNames)) {
|
||||
for (String encodingName : encodingNames) {
|
||||
- // "identity" codings are ignored
|
||||
addInputFilter(inputFilters, encodingName);
|
||||
}
|
||||
} else {
|
||||
Index: apache-tomcat-9.0.43-src/test/org/apache/coyote/http11/TestHttp11Processor.java
|
||||
===================================================================
|
||||
--- apache-tomcat-9.0.43-src.orig/test/org/apache/coyote/http11/TestHttp11Processor.java
|
||||
+++ apache-tomcat-9.0.43-src/test/org/apache/coyote/http11/TestHttp11Processor.java
|
||||
@@ -254,31 +254,6 @@ public class TestHttp11Processor extends
|
||||
|
||||
|
||||
@Test
|
||||
- public void testWithTEIdentity() throws Exception {
|
||||
- getTomcatInstanceTestWebapp(false, true);
|
||||
-
|
||||
- String request =
|
||||
- "POST /test/echo-params.jsp HTTP/1.1" + SimpleHttpClient.CRLF +
|
||||
- "Host: any" + SimpleHttpClient.CRLF +
|
||||
- "Transfer-encoding: identity" + SimpleHttpClient.CRLF +
|
||||
- "Content-Length: 9" + SimpleHttpClient.CRLF +
|
||||
- "Content-Type: application/x-www-form-urlencoded" +
|
||||
- SimpleHttpClient.CRLF +
|
||||
- "Connection: close" + SimpleHttpClient.CRLF +
|
||||
- SimpleHttpClient.CRLF +
|
||||
- "test=data";
|
||||
-
|
||||
- Client client = new Client(getPort());
|
||||
- client.setRequest(new String[] {request});
|
||||
-
|
||||
- client.connect();
|
||||
- client.processRequest();
|
||||
- Assert.assertTrue(client.isResponse200());
|
||||
- Assert.assertTrue(client.getResponseBody().contains("test - data"));
|
||||
- }
|
||||
-
|
||||
-
|
||||
- @Test
|
||||
public void testWithTESavedRequest() throws Exception {
|
||||
getTomcatInstanceTestWebapp(false, true);
|
||||
|
||||
@@ -1859,4 +1834,102 @@ public class TestHttp11Processor extends
|
||||
// NO-OP
|
||||
}
|
||||
}
|
||||
+
|
||||
+
|
||||
+ @Test
|
||||
+ public void testTEHeaderUnknown01() throws Exception {
|
||||
+ doTestTEHeaderUnknown("identity");
|
||||
+ }
|
||||
+
|
||||
+
|
||||
+ @Test
|
||||
+ public void testTEHeaderUnknown02() throws Exception {
|
||||
+ doTestTEHeaderUnknown("identity, chunked");
|
||||
+ }
|
||||
+
|
||||
+
|
||||
+ @Test
|
||||
+ public void testTEHeaderUnknown03() throws Exception {
|
||||
+ doTestTEHeaderUnknown("unknown, chunked");
|
||||
+ }
|
||||
+
|
||||
+
|
||||
+ @Test
|
||||
+ public void testTEHeaderUnknown04() throws Exception {
|
||||
+ doTestTEHeaderUnknown("void");
|
||||
+ }
|
||||
+
|
||||
+
|
||||
+ @Test
|
||||
+ public void testTEHeaderUnknown05() throws Exception {
|
||||
+ doTestTEHeaderUnknown("void, chunked");
|
||||
+ }
|
||||
+
|
||||
+
|
||||
+ @Test
|
||||
+ public void testTEHeaderUnknown06() throws Exception {
|
||||
+ doTestTEHeaderUnknown("void, identity");
|
||||
+ }
|
||||
+
|
||||
+
|
||||
+ @Test
|
||||
+ public void testTEHeaderUnknown07() throws Exception {
|
||||
+ doTestTEHeaderUnknown("identity, void");
|
||||
+ }
|
||||
+
|
||||
+
|
||||
+ private void doTestTEHeaderUnknown(String headerValue) throws Exception {
|
||||
+ Tomcat tomcat = getTomcatInstance();
|
||||
+
|
||||
+ // No file system docBase required
|
||||
+ Context ctx = tomcat.addContext("", null);
|
||||
+
|
||||
+ // Add servlet
|
||||
+ Tomcat.addServlet(ctx, "TesterServlet", new TesterServlet(false));
|
||||
+ ctx.addServletMappingDecoded("/foo", "TesterServlet");
|
||||
+
|
||||
+ tomcat.start();
|
||||
+
|
||||
+ String request =
|
||||
+ "GET /foo HTTP/1.1" + SimpleHttpClient.CRLF +
|
||||
+ "Host: localhost:" + getPort() + SimpleHttpClient.CRLF +
|
||||
+ "Transfer-Encoding: " + headerValue + SimpleHttpClient.CRLF +
|
||||
+ SimpleHttpClient.CRLF;
|
||||
+
|
||||
+ Client client = new Client(tomcat.getConnector().getLocalPort());
|
||||
+ client.setRequest(new String[] {request});
|
||||
+
|
||||
+ client.connect();
|
||||
+ client.processRequest(false);
|
||||
+
|
||||
+ Assert.assertTrue(client.isResponse501());
|
||||
+ }
|
||||
+
|
||||
+
|
||||
+ @Test
|
||||
+ public void testWithTEChunkedHttp10() throws Exception {
|
||||
+
|
||||
+ getTomcatInstanceTestWebapp(false, true);
|
||||
+
|
||||
+ String request =
|
||||
+ "POST /test/echo-params.jsp HTTP/1.0" + SimpleHttpClient.CRLF +
|
||||
+ "Host: any" + SimpleHttpClient.CRLF +
|
||||
+ "Transfer-encoding: chunked" + SimpleHttpClient.CRLF +
|
||||
+ "Content-Type: application/x-www-form-urlencoded" +
|
||||
+ SimpleHttpClient.CRLF +
|
||||
+ "Connection: close" + SimpleHttpClient.CRLF +
|
||||
+ SimpleHttpClient.CRLF +
|
||||
+ "9" + SimpleHttpClient.CRLF +
|
||||
+ "test=data" + SimpleHttpClient.CRLF +
|
||||
+ "0" + SimpleHttpClient.CRLF +
|
||||
+ SimpleHttpClient.CRLF;
|
||||
+
|
||||
+ Client client = new Client(getPort());
|
||||
+ client.setRequest(new String[] {request});
|
||||
+
|
||||
+ client.connect();
|
||||
+ client.processRequest();
|
||||
+ Assert.assertTrue(client.isResponse200());
|
||||
+ Assert.assertTrue(client.getResponseBody().contains("test - data"));
|
||||
+ }
|
||||
}
|
||||
Index: apache-tomcat-9.0.43-src/webapps/docs/changelog.xml
|
||||
===================================================================
|
||||
--- apache-tomcat-9.0.43-src.orig/webapps/docs/changelog.xml
|
||||
+++ apache-tomcat-9.0.43-src/webapps/docs/changelog.xml
|
||||
@@ -347,6 +347,16 @@
|
||||
connections are attempted and fail. Patch provided by Maurizio Adami.
|
||||
(markt)
|
||||
</fix>
|
||||
+ <fix>
|
||||
+ Remove support for the <code>identity</code> transfer encoding. The
|
||||
+ inclusion of this encoding in RFC 2616 was an error that was corrected
|
||||
+ in 2001. Requests using this transfer encoding will now receive a 501
|
||||
+ response. (markt)
|
||||
+ </fix>
|
||||
+ <fix>
|
||||
+ Process transfer encoding headers from both HTTP 1.0 and HTTP 1.1
|
||||
+ clients. (markt)
|
||||
+ </fix>
|
||||
</changelog>
|
||||
</subsection>
|
||||
<subsection name="Web applications">
|
55
tomcat-9.0-CVE-2021-41079.patch
Normal file
55
tomcat-9.0-CVE-2021-41079.patch
Normal file
@ -0,0 +1,55 @@
|
||||
From d4b340fa8feaf55831f9a59350578f7b6ca048b8 Mon Sep 17 00:00:00 2001
|
||||
From: Mark Thomas <markt@apache.org>
|
||||
Date: Wed, 3 Mar 2021 12:00:46 +0000
|
||||
Subject: [PATCH] Improve robustness
|
||||
|
||||
---
|
||||
.../apache/tomcat/util/net/openssl/LocalStrings.properties | 1 +
|
||||
java/org/apache/tomcat/util/net/openssl/OpenSSLEngine.java | 6 ++++--
|
||||
webapps/docs/changelog.xml | 4 ++++
|
||||
3 files changed, 9 insertions(+), 2 deletions(-)
|
||||
|
||||
Index: apache-tomcat-9.0.43-src/java/org/apache/tomcat/util/net/openssl/LocalStrings.properties
|
||||
===================================================================
|
||||
--- apache-tomcat-9.0.43-src.orig/java/org/apache/tomcat/util/net/openssl/LocalStrings.properties
|
||||
+++ apache-tomcat-9.0.43-src/java/org/apache/tomcat/util/net/openssl/LocalStrings.properties
|
||||
@@ -17,6 +17,7 @@ engine.ciphersFailure=Failed getting cip
|
||||
engine.emptyCipherSuite=Empty cipher suite
|
||||
engine.engineClosed=Engine is closed
|
||||
engine.failedCipherSuite=Failed to enable cipher suite [{0}]
|
||||
+engine.failedToReadAvailableBytes=There are plain text bytes available to read but no bytes were read
|
||||
engine.inboundClose=Inbound closed before receiving peer's close_notify
|
||||
engine.invalidBufferArray=offset: [{0}], length: [{1}] (expected: offset <= offset + length <= srcs.length [{2}])
|
||||
engine.invalidDestinationBuffersState=The state of the destination buffers changed concurrently while unwrapping bytes
|
||||
Index: apache-tomcat-9.0.43-src/java/org/apache/tomcat/util/net/openssl/OpenSSLEngine.java
|
||||
===================================================================
|
||||
--- apache-tomcat-9.0.43-src.orig/java/org/apache/tomcat/util/net/openssl/OpenSSLEngine.java
|
||||
+++ apache-tomcat-9.0.43-src/java/org/apache/tomcat/util/net/openssl/OpenSSLEngine.java
|
||||
@@ -592,8 +592,10 @@ public final class OpenSSLEngine extends
|
||||
throw new SSLException(e);
|
||||
}
|
||||
|
||||
- if (bytesRead == 0) {
|
||||
- break;
|
||||
+ if (bytesRead <= 0) {
|
||||
+ // This should not be possible. pendingApp is positive
|
||||
+ // therefore the read should have read at least one byte.
|
||||
+ throw new IllegalStateException(sm.getString("engine.failedToReadAvailableBytes"));
|
||||
}
|
||||
|
||||
bytesProduced += bytesRead;
|
||||
Index: apache-tomcat-9.0.43-src/webapps/docs/changelog.xml
|
||||
===================================================================
|
||||
--- apache-tomcat-9.0.43-src.orig/webapps/docs/changelog.xml
|
||||
+++ apache-tomcat-9.0.43-src/webapps/docs/changelog.xml
|
||||
@@ -173,6 +173,10 @@
|
||||
the access log file, include information on the current user in the
|
||||
associated log message (markt)
|
||||
</fix>
|
||||
+ <fix>
|
||||
+ Make handling of OpenSSL read errors more robust when plain text data is
|
||||
+ reported to be available to read. (markt)
|
||||
+ </fix>
|
||||
</changelog>
|
||||
</subsection>
|
||||
<subsection name="Coyote">
|
@ -5,6 +5,24 @@ Wed Nov 10 06:51:24 UTC 2021 - Fridrich Strba <fstrba@suse.com>
|
||||
* tomcat-9.0-osgi-build.patch
|
||||
+ account for biz.aQute.bnd.ant artifact in aqute-bnd >= 5.2.0
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Oct 29 11:15:32 UTC 2021 - Michele Bussolotto <michele.bussolotto@suse.com>
|
||||
|
||||
- Fixed CVEs:
|
||||
* CVE-2021-30640: Escape parameters in JNDI Realm queries (bsc#1188279)
|
||||
* CVE-2021-33037: Process T-E header from both HTTP 1.0 and HTTP 1.1. clients (bsc#1188278)
|
||||
- Added patches:
|
||||
* tomcat-9.0-CVE-2021-30640.patch
|
||||
* tomcat-9.0-CVE-2021-33037.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Oct 28 08:33:07 UTC 2021 - Michele Bussolotto <michele.bussolotto@suse.com>
|
||||
|
||||
- Fixed CVEs:
|
||||
* CVE-2021-41079: Validate incoming TLS packet (bsc#1190558)
|
||||
- Added patches:
|
||||
* tomcat-9.0-CVE-2021-41079.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Oct 18 21:42:48 UTC 2021 - Marcel Witte <wittemar@googlemail.com>
|
||||
|
||||
|
@ -83,6 +83,9 @@ Patch4: tomcat-9.0-osgi-build.patch
|
||||
Patch5: tomcat-9.0.43-java8compat.patch
|
||||
# PATCH-FIX-OPENSUSE: set ajp connector secreteRequired to false by default to avoid tomcat not starting
|
||||
Patch6: tomcat-9.0.31-secretRequired-default.patch
|
||||
Patch7: tomcat-9.0-CVE-2021-41079.patch
|
||||
Patch8: tomcat-9.0-CVE-2021-33037.patch
|
||||
Patch9: tomcat-9.0-CVE-2021-30640.patch
|
||||
|
||||
BuildRequires: ant >= 1.8.1
|
||||
BuildRequires: ant-antlr
|
||||
@ -257,6 +260,9 @@ find . -type f \( -name "*.bat" -o -name "*.class" -o -name Thumbs.db -o -name "
|
||||
%patch4 -p1
|
||||
%patch5 -p1
|
||||
%patch6 -p1
|
||||
%patch7 -p1
|
||||
%patch8 -p1
|
||||
%patch9 -p1
|
||||
|
||||
# remove date from docs
|
||||
sed -i -e '/build-date/ d' webapps/docs/tomcat-docs.xsl
|
||||
|
Loading…
x
Reference in New Issue
Block a user