ALAS-2019-1234


Amazon Linux AMI Security Advisory: ALAS-2019-1234
Advisory Release Date: 2019-07-25 18:35 Pacific
Severity: Important

Issue Overview:

The HTTP/2 implementation in Apache Tomcat accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS. (CVE-2019-0199 )


The SSI printenv command in Apache Tomcat echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website. (CVE-2019-0221 )


Affected Packages:

tomcat8


Issue Correction:
Run yum update tomcat8 to update your system.

New Packages:
noarch:
    tomcat8-servlet-3.1-api-8.5.42-1.80.amzn1.noarch
    tomcat8-lib-8.5.42-1.80.amzn1.noarch
    tomcat8-jsp-2.3-api-8.5.42-1.80.amzn1.noarch
    tomcat8-docs-webapp-8.5.42-1.80.amzn1.noarch
    tomcat8-el-3.0-api-8.5.42-1.80.amzn1.noarch
    tomcat8-javadoc-8.5.42-1.80.amzn1.noarch
    tomcat8-admin-webapps-8.5.42-1.80.amzn1.noarch
    tomcat8-8.5.42-1.80.amzn1.noarch
    tomcat8-webapps-8.5.42-1.80.amzn1.noarch
    tomcat8-log4j-8.5.42-1.80.amzn1.noarch

src:
    tomcat8-8.5.42-1.80.amzn1.src