UBUNTU-CVE-2017-6056

Source
https://ubuntu.com/security/CVE-2017-6056
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-6056.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-6056
Upstream
Downstream
Related
Published
2017-02-13T00:00:00Z
Modified
2026-02-04T03:14:27.494651Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

References

Affected packages

Ubuntu:14.04:LTS / tomcat7

Package

Name
tomcat7
Purl
pkg:deb/ubuntu/tomcat7@7.0.52-1ubuntu0.10?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.0.52-1ubuntu0.10

Affected versions

7.*
7.0.42-1
7.0.47-1
7.0.50-1
7.0.52-1
7.0.52-1ubuntu0.1
7.0.52-1ubuntu0.3
7.0.52-1ubuntu0.6
7.0.52-1ubuntu0.7
7.0.52-1ubuntu0.8
7.0.52-1ubuntu0.9

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libservlet3.0-java",
            "binary_version": "7.0.52-1ubuntu0.10"
        },
        {
            "binary_name": "libtomcat7-java",
            "binary_version": "7.0.52-1ubuntu0.10"
        },
        {
            "binary_name": "tomcat7",
            "binary_version": "7.0.52-1ubuntu0.10"
        },
        {
            "binary_name": "tomcat7-admin",
            "binary_version": "7.0.52-1ubuntu0.10"
        },
        {
            "binary_name": "tomcat7-common",
            "binary_version": "7.0.52-1ubuntu0.10"
        },
        {
            "binary_name": "tomcat7-docs",
            "binary_version": "7.0.52-1ubuntu0.10"
        },
        {
            "binary_name": "tomcat7-examples",
            "binary_version": "7.0.52-1ubuntu0.10"
        },
        {
            "binary_name": "tomcat7-user",
            "binary_version": "7.0.52-1ubuntu0.10"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-6056.json"

Ubuntu:Pro:14.04:LTS / tomcat6

Package

Name
tomcat6
Purl
pkg:deb/ubuntu/tomcat6@6.0.39-1ubuntu0.1+esm1?arch=source&distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.39-1ubuntu0.1+esm1

Affected versions

6.*
6.0.37-1
6.0.39-1
6.0.39-1ubuntu0.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libservlet2.4-java",
            "binary_version": "6.0.39-1ubuntu0.1+esm1"
        },
        {
            "binary_name": "libservlet2.5-java",
            "binary_version": "6.0.39-1ubuntu0.1+esm1"
        },
        {
            "binary_name": "libtomcat6-java",
            "binary_version": "6.0.39-1ubuntu0.1+esm1"
        },
        {
            "binary_name": "tomcat6",
            "binary_version": "6.0.39-1ubuntu0.1+esm1"
        },
        {
            "binary_name": "tomcat6-admin",
            "binary_version": "6.0.39-1ubuntu0.1+esm1"
        },
        {
            "binary_name": "tomcat6-common",
            "binary_version": "6.0.39-1ubuntu0.1+esm1"
        },
        {
            "binary_name": "tomcat6-docs",
            "binary_version": "6.0.39-1ubuntu0.1+esm1"
        },
        {
            "binary_name": "tomcat6-examples",
            "binary_version": "6.0.39-1ubuntu0.1+esm1"
        },
        {
            "binary_name": "tomcat6-extras",
            "binary_version": "6.0.39-1ubuntu0.1+esm1"
        },
        {
            "binary_name": "tomcat6-user",
            "binary_version": "6.0.39-1ubuntu0.1+esm1"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-6056.json"

Ubuntu:16.04:LTS / tomcat6

Package

Name
tomcat6
Purl
pkg:deb/ubuntu/tomcat6@6.0.45+dfsg-1ubuntu0.2?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.0.41-4
6.0.45+dfsg-1
6.0.45+dfsg-1ubuntu0.1
6.0.45+dfsg-1ubuntu0.2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libservlet2.5-java",
            "binary_version": "6.0.45+dfsg-1ubuntu0.2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-6056.json"