It was discovered that Tomcat incorrectly handled certain pipelined requests when sendfile was used. A remote attacker could use this issue to obtain wrong responses possibly containing sensitive information. (CVE-2017-5647)
It was discovered that Tomcat incorrectly used the appropriate facade object. A malicious application could possibly use this to bypass Security Manager restrictions. (CVE-2017-5648)
It was discovered that Tomcat incorrectly handled error pages. A remote attacker could possibly use this issue to replace or remove the custom error page. (CVE-2017-5664)
It was discovered that Tomcat incorrectly handled the CORS filter. A remote attacker could possibly use this issue to perform cache poisoning. (CVE-2017-7674)
{ "availability": "No subscription required", "binaries": [ { "tomcat7-examples": "7.0.52-1ubuntu0.13", "tomcat7-admin": "7.0.52-1ubuntu0.13", "tomcat7-user": "7.0.52-1ubuntu0.13", "libservlet3.0-java": "7.0.52-1ubuntu0.13", "libservlet3.0-java-doc": "7.0.52-1ubuntu0.13", "libtomcat7-java": "7.0.52-1ubuntu0.13", "tomcat7-docs": "7.0.52-1ubuntu0.13", "tomcat7": "7.0.52-1ubuntu0.13", "tomcat7-common": "7.0.52-1ubuntu0.13" } ] }
{ "availability": "No subscription required", "binaries": [ { "tomcat8-common": "8.0.32-1ubuntu1.5", "tomcat8-admin": "8.0.32-1ubuntu1.5", "tomcat8-user": "8.0.32-1ubuntu1.5", "libtomcat8-java": "8.0.32-1ubuntu1.5", "tomcat8": "8.0.32-1ubuntu1.5", "tomcat8-examples": "8.0.32-1ubuntu1.5", "libservlet3.1-java-doc": "8.0.32-1ubuntu1.5", "libservlet3.1-java": "8.0.32-1ubuntu1.5", "tomcat8-docs": "8.0.32-1ubuntu1.5" } ] }