Description
 The session-persistence implementation in Apache Tomcat 6.x before 6.0.45,
7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles
session attributes, which allows remote authenticated users to bypass
intended SecurityManager restrictions and execute arbitrary code in a
privileged context via a web application that places a crafted object in a
session.
 
Ubuntu-Description
 It was discovered that the Tomcat session-persistence implementation
incorrectly handled session attributes. A remote attacker could possibly
use this issue to execute arbitrary code in a privileged context.
 
Notes
| mdeslaur | list of backports is incomplete. Fix is intrusive. | 
  
Package
| Upstream: | released
(6.0.45)
 | 
| Ubuntu 18.04 LTS: | DNE
 | 
| Ubuntu 14.04 ESM: | released
(6.0.39-1ubuntu0.1)
 | 
| Ubuntu 20.04 FIPS Compliant: | DNE
 | 
Patches:
 
Package
| Upstream: | released
(7.0.68-1)
 | 
| Ubuntu 18.04 LTS: | not-affected
(7.0.68-1)
 | 
| Ubuntu 14.04 ESM: | released
(7.0.52-1ubuntu0.6)
 | 
| Ubuntu 20.04 FIPS Compliant: | not-affected
(7.0.68-1)
 | 
Patches:
 
Package
| Upstream: | released
(8.0.32-1)
 | 
| Ubuntu 18.04 LTS: | not-affected
(8.0.32-1ubuntu1)
 | 
| Ubuntu 16.04 ESM: | not-affected
(8.0.32-1ubuntu1)
 | 
| Ubuntu 14.04 ESM: | DNE
 | 
| Ubuntu 20.04 FIPS Compliant: | not-affected
(8.0.32-1ubuntu1)
 | 
Patches:
 
Updated: 2022-04-13 12:09:01 UTC  (commit f411bd370d482ef4385c4e751d121a4055fbc009)