When parsing the AIA-Extension field of a client certificate, Apache Tomcat
Native Connector 1.2.0 to 1.2.14 and 1.1.23 to 1.1.34 did not correctly
handle fields longer than 127 bytes. The result of the parsing error was to
skip the OCSP check. It was therefore possible for client certificates that
should have been rejected (if the OCSP check had been made) to be accepted.
Users not using OCSP checks are not affected by this vulnerability.
Upstream:released (1.2.16-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Trusty/esm:DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1.2.16-1)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (1.2.16-1)
Ubuntu 19.04 (Disco Dingo):not-affected (1.2.16-1)
Ubuntu 19.10 (Eoan):not-affected (1.2.16-1)
More Information

Updated: 2019-04-26 14:20:30 UTC (commit 30899e40836d26e1bb5f0b072d31fd87b6cf3bd4)