Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [SECURITY] [DSA 3447-1] tomcat7 security update

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [SECURITY] [DSA 3447-1] tomcat7 security update


Chronologisch Thread 
  • From: Salvatore Bonaccorso <carnil AT debian.org>
  • To: debian-security-announce AT lists.debian.org
  • Subject: [IT-SecNots] [SECURITY] [DSA 3447-1] tomcat7 security update
  • Date: Sun, 17 Jan 2016 15:47:11 +0000
  • List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
  • List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
  • List-url: <http://lists.debian.org/debian-security-announce/>
  • Old-return-path: <carnil AT master.debian.org>
  • Priority: urgent
  • Resent-date: Sun, 17 Jan 2016 15:47:29 +0000 (UTC)
  • Resent-from: debian-security-announce AT lists.debian.org
  • Resent-message-id: <PFH8PXFmfFP.A.nUD.Re7mWB@bendel>
  • Resent-sender: debian-security-announce-request AT lists.debian.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3447-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
January 17, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : tomcat7
CVE ID : CVE-2014-7810

It was discovered that malicious web applications could use the
Expression Language to bypass protections of a Security Manager as
expressions were evaluated within a privileged code section.

For the oldstable distribution (wheezy), this problem has been fixed
in version 7.0.28-4+deb7u3. This update also provides fixes for
CVE-2013-4444, CVE-2014-0075, CVE-2014-0099, CVE-2014-0227 and
CVE-2014-0230, which were all fixed for the stable distribution (jessie)
already.

For the stable distribution (jessie), this problem has been fixed in
version 7.0.56-3+deb8u1.

For the testing distribution (stretch), this problem has been fixed
in version 7.0.61-1.

For the unstable distribution (sid), this problem has been fixed in
version 7.0.61-1.

We recommend that you upgrade your tomcat7 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCgAGBQJWm7S6AAoJEAVMuPMTQ89Ebm0P/1+Y6sr5nI047SzWuDFKKBwx
g9+06/4kE/Dh7a6yIyAttK2TdVa4XDutfuBFEyVhnE4f7AWaXwIb3lxFkhz2/Qbg
Zp/VnYirBBHkAknb5f12OOJjCAw0/7W6vbr2IW7h1gdp+xy0G/lg2S5hVXx+kqX5
cZeSPRNhKBwBrsV+Xqy0vuKk7+U8oXoqFI0Olvm5lPY6RMLWevyz3emT5zQrH4RV
GDSzHBj0gmenWKs/0aRRiQLEDVeQ9nQBfX7EYFUPwAIey1EdZ4UGX64l6iLJeEc1
02DjEuALvFb9Jc4XlyvBI62MtxWbnxN2M45Suz2WH7jJlOMgdI6wckgjlKJ88R+S
MYCypVEslizdPmyh1gmNKwypd/SBo0qksWWTH4rENu/fNGOTCg+DRxbKneOH0YnN
X6R8ZIrnZpPiaSoct5MAYR64ezoN/eG+tT937chN6yXU0Y1Jl3nnQarwq8zszfZD
JrJsiK+mU+WJ0daQI1QRrZ6OUcHWlwZjaJHhYuS/YblVHKw+vbbROrCh72XDXGGE
RrsUAjr3FHJg7GlfHDPNsmA/5V3IDByZoGh5dIRDmBeAboLbLqr/dWxnICc+iTOQ
+NyTq4Dtiwpfd4TTUKkWfV/pTvWyIVehG5QUzupjOLLj9Eq1dTY9G4JYC70ubOHj
OR/mkXtGwcfLKv8+7n2X
=wSYl
-----END PGP SIGNATURE-----




  • [IT-SecNots] [SECURITY] [DSA 3447-1] tomcat7 security update, Salvatore Bonaccorso, 17.01.2016

Archiv bereitgestellt durch MHonArc 2.6.19.

Seitenanfang