Description:
* SECURITY UPDATE: Misc vulnerability fixes
- CVE-2019-12418, CVE-2019-17563, CVE-2020-1935,
CVE-2020-11996, CVE-2020-13934, CVE-2020-13935,
CVE-2020-13943, CVE-2020-17527, CVE-2021-24122,
CVE-2021-30639, CVE-2021-30640, CVE-2021-33037,
CVE-2021-42340, CVE-2021-43980, CVE-2022-25762,
CVE-2022-34305, CVE-2022-45143, CVE-2023-24998,
CVE-2023-28709, CVE-2023-34981, CVE-2023-42794,
CVE-2024-21733
* Update to 8.5.100
- debian/rules,
debian/libtomcat8-java.poms,
debian/maven.rules,
debian/tomcat8-common.links,
debian/patches/0018-fix-manager-webapp.patch,
debian/patches/0019-add-distribution-to-error-page.patch,
debian/patches/0021-dont-test-unsupported-ciphers.patch,
debian/patches/0101-skipping-tests-incompatible-with-firewall.patch:
updated
- debian/patches/0002-do-not-load-AJP13-connector-by-default.patch,
debian/patches/0026-easymock4-compatibility.patch:
removed as they were applied in upstream
- CVE-2019-0221.patch, CVE-2019-10072-1.patch,
CVE-2019-10072-2.patch, CVE-2022-42252.patch,
CVE-2020-1938.patch, CVE-2021-25122.patch,
CVE-2021-41079.patch, CVE-2022-29885.patch,
CVE-2020-9484.patch, CVE-2021-25329-pre1.patch,
CVE-2021-25329.patch, CVE-2022-23181.patch,
CVE-2023-44487.patch, CVE-2023-46589-pre1.patch,
CVE-2023-46589-pre2.patch, CVE-2023-46589-pre3.patch,
CVE-2023-46589-pre4.patch, CVE-2023-46589.patch:
removed because these CVEs were fixed in upstream
* Internal tests
- debian/test_certs/*: updated from upstream branch 9.0.x, as the
8.0.x certs were expired