DSA-4118-1 tomcat-native -- security update

Related Vulnerabilities: CVE-2017-15698  

Jonas Klempel reported that tomcat-native, a library giving Tomcat access to the Apache Portable Runtime (APR) library's network connection (socket) implementation and random-number generator, does not properly handle fields longer than 127 bytes when parsing the AIA-Extension field of a client certificate. If OCSP checks are used, this could result in client certificates that should have been rejected to be accepted. For the oldstable distribution (jessie), this problem has been fixed in version 1.1.32~repack-2+deb8u1. For the stable distribution (stretch), this problem has been fixed in version 1.2.12-2+deb9u1. We recommend that you upgrade your tomcat-native packages. For the detailed security status of tomcat-native please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tomcat-native

Debian Security Advisory

DSA-4118-1 tomcat-native -- security update

Date Reported:
17 Feb 2018
Affected Packages:
tomcat-native
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2017-15698.
More information:

Jonas Klempel reported that tomcat-native, a library giving Tomcat access to the Apache Portable Runtime (APR) library's network connection (socket) implementation and random-number generator, does not properly handle fields longer than 127 bytes when parsing the AIA-Extension field of a client certificate. If OCSP checks are used, this could result in client certificates that should have been rejected to be accepted.

For the oldstable distribution (jessie), this problem has been fixed in version 1.1.32~repack-2+deb8u1.

For the stable distribution (stretch), this problem has been fixed in version 1.2.12-2+deb9u1.

We recommend that you upgrade your tomcat-native packages.

For the detailed security status of tomcat-native please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tomcat-native