Blame SOURCES/tomcat-7.0.69-CVE-2017-5648.patch

75b9e1
--- java/org/apache/catalina/authenticator/FormAuthenticator.java.orig	2017-06-09 13:00:33.854323751 -0400
75b9e1
+++ java/org/apache/catalina/authenticator/FormAuthenticator.java	2017-06-09 13:00:33.861323775 -0400
75b9e1
@@ -406,9 +406,9 @@
75b9e1
         RequestDispatcher disp =
75b9e1
             context.getServletContext().getRequestDispatcher(loginPage);
75b9e1
         try {
75b9e1
-            if (context.fireRequestInitEvent(request)) {
75b9e1
+            if (context.fireRequestInitEvent(request.getRequest())) {
75b9e1
                 disp.forward(request.getRequest(), response);
75b9e1
-                context.fireRequestDestroyEvent(request);
75b9e1
+                context.fireRequestDestroyEvent(request.getRequest());
75b9e1
             }
75b9e1
         } catch (Throwable t) {
75b9e1
             ExceptionUtils.handleThrowable(t);
75b9e1
@@ -450,12 +450,11 @@
75b9e1
         }
75b9e1
 
75b9e1
         RequestDispatcher disp =
75b9e1
-            context.getServletContext().getRequestDispatcher
75b9e1
-            (config.getErrorPage());
75b9e1
+                context.getServletContext().getRequestDispatcher(config.getErrorPage());
75b9e1
         try {
75b9e1
-            if (context.fireRequestInitEvent(request)) {
75b9e1
+            if (context.fireRequestInitEvent(request.getRequest())) {
75b9e1
                 disp.forward(request.getRequest(), response);
75b9e1
-                context.fireRequestDestroyEvent(request);
75b9e1
+                context.fireRequestDestroyEvent(request.getRequest());
75b9e1
             }
75b9e1
         } catch (Throwable t) {
75b9e1
             ExceptionUtils.handleThrowable(t);
75b9e1
--- java/org/apache/catalina/core/AsyncContextImpl.java.orig	2017-06-09 13:00:33.855323755 -0400
75b9e1
+++ java/org/apache/catalina/core/AsyncContextImpl.java	2017-06-09 13:02:46.108767706 -0400
75b9e1
@@ -157,6 +157,7 @@
75b9e1
                 }
75b9e1
             }
75b9e1
         } finally {
75b9e1
+            context.fireRequestDestroyEvent(request.getRequest());
75b9e1
             clearServletRequestResponse();
75b9e1
             if (Globals.IS_SECURITY_ENABLED) {
75b9e1
                 PrivilegedAction<Void> pa = new PrivilegedSetTccl(oldCL);
75b9e1
--- java/org/apache/catalina/core/StandardHostValve.java.orig	2017-06-09 13:00:33.856323758 -0400
75b9e1
+++ java/org/apache/catalina/core/StandardHostValve.java	2017-06-09 13:05:06.702248405 -0400
75b9e1
@@ -66,7 +66,7 @@
75b9e1
 
75b9e1
     static {
75b9e1
         STRICT_SERVLET_COMPLIANCE = Globals.STRICT_SERVLET_COMPLIANCE;
75b9e1
-        
75b9e1
+
75b9e1
         String accessSession = System.getProperty(
75b9e1
                 "org.apache.catalina.core.StandardHostValve.ACCESS_SESSION");
75b9e1
         if (accessSession == null) {
75b9e1
@@ -146,7 +146,7 @@
75b9e1
             if (Globals.IS_SECURITY_ENABLED) {
75b9e1
                 PrivilegedAction<Void> pa = new PrivilegedSetTccl(
75b9e1
                         context.getLoader().getClassLoader());
75b9e1
-                AccessController.doPrivileged(pa);                
75b9e1
+                AccessController.doPrivileged(pa);
75b9e1
             } else {
75b9e1
                 Thread.currentThread().setContextClassLoader
75b9e1
                         (context.getLoader().getClassLoader());
75b9e1
@@ -156,9 +156,9 @@
75b9e1
             request.setAsyncSupported(context.getPipeline().isAsyncSupported());
75b9e1
         }
75b9e1
 
75b9e1
-        boolean asyncAtStart = request.isAsync(); 
75b9e1
+        boolean asyncAtStart = request.isAsync();
75b9e1
         boolean asyncDispatching = request.isAsyncDispatching();
75b9e1
-        if (asyncAtStart || context.fireRequestInitEvent(request)) {
75b9e1
+        if (asyncAtStart || context.fireRequestInitEvent(request.getRequest())) {
75b9e1
 
75b9e1
             // Ask this Context to process this request. Requests that are in
75b9e1
             // async mode and are not being dispatched to this resource must be
75b9e1
@@ -197,7 +197,7 @@
75b9e1
             if (!context.getState().isAvailable()) {
75b9e1
                 return;
75b9e1
             }
75b9e1
-    
75b9e1
+
75b9e1
             // Look for (and render if found) an application level error page
75b9e1
             if (response.isErrorReportRequired()) {
75b9e1
                 if (t != null) {
75b9e1
@@ -208,7 +208,7 @@
75b9e1
             }
75b9e1
 
75b9e1
             if (!request.isAsync() && (!asyncAtStart || !response.isErrorReportRequired())) {
75b9e1
-                context.fireRequestDestroyEvent(request);
75b9e1
+                context.fireRequestDestroyEvent(request.getRequest());
75b9e1
             }
75b9e1
         }
75b9e1
 
75b9e1
@@ -222,7 +222,7 @@
75b9e1
         if (Globals.IS_SECURITY_ENABLED) {
75b9e1
             PrivilegedAction<Void> pa = new PrivilegedSetTccl(
75b9e1
                     StandardHostValve.class.getClassLoader());
75b9e1
-            AccessController.doPrivileged(pa);                
75b9e1
+            AccessController.doPrivileged(pa);
75b9e1
         } else {
75b9e1
             Thread.currentThread().setContextClassLoader
75b9e1
                     (StandardHostValve.class.getClassLoader());
75b9e1
@@ -258,7 +258,7 @@
75b9e1
         // Ask this Context to process this request
75b9e1
         context.getPipeline().getFirst().event(request, response, event);
75b9e1
 
75b9e1
-        
75b9e1
+
75b9e1
         // Error page processing
75b9e1
         response.setSuspended(false);
75b9e1
 
75b9e1
@@ -469,7 +469,7 @@
75b9e1
 
75b9e1
             if (response.isCommitted()) {
75b9e1
                 // Response is committed - including the error page is the
75b9e1
-                // best we can do 
75b9e1
+                // best we can do
75b9e1
                 rd.include(request.getRequest(), response.getResponse());
75b9e1
             } else {
75b9e1
                 // Reset the response (keeping the real error code and message)
75b9e1
--- webapps/docs/changelog.xml.orig	2017-06-09 13:00:33.858323765 -0400
75b9e1
+++ webapps/docs/changelog.xml	2017-06-09 13:02:03.530622703 -0400
75b9e1
@@ -57,6 +57,16 @@
75b9e1
   They eventually become mixed with the numbered issues. (I.e., numbered
75b9e1
   issues do not "pop up" wrt. others).
75b9e1
 -->
75b9e1
+<section name="Tomcat 7.0.69-12 (csutherl)">
75b9e1
+  <subsection name="Coyote">
75b9e1
+    <changelog>
75b9e1
+      <fix>
75b9e1
+        Ensure request and response facades are used when firing application
75b9e1
+        listeners. (markt/remm)
75b9e1
+      </fix>
75b9e1
+    </changelog>
75b9e1
+  </subsection>
75b9e1
+</section>
75b9e1
 <section name="Tomcat 7.0.69-11 (csutherl)">
75b9e1
   <subsection name="Coyote">
75b9e1
     <changelog>