Amazon Linux 1 Security Advisory: ALAS-2019-1234
Advisory Release Date: 2019-07-17 23:21 Pacific
Advisory Updated Date: 2019-07-25 18:35 Pacific
The HTTP/2 implementation in Apache Tomcat accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS. (CVE-2019-0199)
The SSI printenv command in Apache Tomcat echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website. (CVE-2019-0221)
Affected Packages:
tomcat8
Issue Correction:
Run yum update tomcat8 to update your system.
noarch:
tomcat8-servlet-3.1-api-8.5.42-1.80.amzn1.noarch
tomcat8-lib-8.5.42-1.80.amzn1.noarch
tomcat8-jsp-2.3-api-8.5.42-1.80.amzn1.noarch
tomcat8-docs-webapp-8.5.42-1.80.amzn1.noarch
tomcat8-el-3.0-api-8.5.42-1.80.amzn1.noarch
tomcat8-javadoc-8.5.42-1.80.amzn1.noarch
tomcat8-admin-webapps-8.5.42-1.80.amzn1.noarch
tomcat8-8.5.42-1.80.amzn1.noarch
tomcat8-webapps-8.5.42-1.80.amzn1.noarch
tomcat8-log4j-8.5.42-1.80.amzn1.noarch
src:
tomcat8-8.5.42-1.80.amzn1.src