it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Markus Koschany <apo AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5009-1] tomcat9 security update
- Date: Fri, 12 Nov 2021 14:35:56 +0000
- List-archive: https://lists.debian.org/msgid-search/20211112143556.GA5273 AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From: Date:Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=QSeRiLbA7rWSVjOQLgV/FJT7iGy9EDUsq0Lq93UcoxI=; b=Yg 3X1PcEVhZ9s55Hgx9OotsHUw9biZdX6k4gjPkvf/8CTzSfmbBYTLUT7EXSslEMbcNDpy5xq+46iNJ N1/WfQkR43eTIatVTZcpzMEV4Max8JNKs++wFNAKWPTzEAyKxg0GefXqtein8PL790ATnV/W69Gcy jticqsv2yiqNMevh9oyXTv0x0CPbwwsEr9KPrjZ0LSoABnbntj3PAQXHd1CKKX745v/7ePOVcaSEv zHCnw3cYUnxcployFtNPe714EpGPVk6KKIvq5vGTYR7fF3KcZGSyWEz/w8D1g2xILFcG7/W8j7wij m/nzrus8JjN/H4rwAN7lVDdTpAB+SXHg==;
- Old-return-path: <apo AT seger.debian.org>
- Priority: urgent
- Resent-date: Fri, 12 Nov 2021 14:54:10 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <fK4nIwJbjD.A.fsB.SAojhB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5009-1 security AT debian.org
https://www.debian.org/security/ Markus Koschany
November 12, 2021 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : tomcat9
CVE ID : CVE-2021-42340
Apache Tomcat, the servlet and JSP engine, did not properly release an HTTP
upgrade connection for WebSocket connections once the WebSocket connection was
closed. This created a memory leak that, over time, could lead to a denial of
service via an OutOfMemoryError.
For the stable distribution (bullseye), this problem has been fixed in
version 9.0.43-2~deb11u3.
We recommend that you upgrade your tomcat9 packages.
For the detailed security status of tomcat9 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/tomcat9
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=wISU
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5009-1] tomcat9 security update, Markus Koschany, 12.11.2021
Archiv bereitgestellt durch MHonArc 2.6.24.