lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1aKpXr-0001ed-AO@master.debian.org>
Date: Sun, 17 Jan 2016 15:47:11 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3447-1] tomcat7 security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3447-1                   security@...ian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
January 17, 2016                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : tomcat7
CVE ID         : CVE-2014-7810

It was discovered that malicious web applications could use the
Expression Language to bypass protections of a Security Manager as
expressions were evaluated within a privileged code section.

For the oldstable distribution (wheezy), this problem has been fixed
in version 7.0.28-4+deb7u3. This update also provides fixes for
CVE-2013-4444, CVE-2014-0075, CVE-2014-0099, CVE-2014-0227 and
CVE-2014-0230, which were all fixed for the stable distribution (jessie)
already.

For the stable distribution (jessie), this problem has been fixed in
version 7.0.56-3+deb8u1.

For the testing distribution (stretch), this problem has been fixed
in version 7.0.61-1.

For the unstable distribution (sid), this problem has been fixed in
version 7.0.61-1.

We recommend that you upgrade your tomcat7 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=wSYl
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ