lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAH9eYVrC4Jj+NpEF_nM0J-+2zN21e_SS_9-Yq0TQsdnfwFZcyQ@mail.gmail.com>
Date: Tue, 13 Sep 2016 10:37:33 -0400
From: Brian Demers <bdemers@...che.org>
To: announce@...ro.apache.org,
  "user@...ro.apache.org" <user@...ro.apache.org>, dev@...ro.apache.org,
  "security@...che.org" <security@...che.org>,
  oss-security@...ts.openwall.com, bugtraq@...urityfocus.com
Subject: [ANNOUNCE][CVE-2016-6802] Apache Shiro 1.3.2 released

The Shiro team is pleased to announce the release of Apache Shiro version 1.3.2.

This security release contains 1 fix since the 1.3.1 release and is
available for Download now [1].

    CVE-2016-6802:
    Apache Shiro before 1.3.2,  when using a non-root servlet context path,
    specifically crafted requests can be used to by pass some security servlet
    filters, resulting in unauthorized access.

Release binaries (.jars) are also available through Maven Central and
source bundles through Apache distribution mirrors.

For more information on Shiro, please read the documentation[2].

-The Apache Shiro Team

[1] http://shiro.apache.org/download.html
[2] http://shiro.apache.org/documentation.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ