Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in tomcat6
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in tomcat6
ID: DSA-3530-1
Distribution: Debian
Plattformen: Debian wheezy
Datum: Fr, 25. März 2016, 22:37
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0227
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5351
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0706
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5174
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7810
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4286
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5346
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0763
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0714
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0075
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0033
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4590
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0230
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5345
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0119
Applikationen: Apache Tomcat

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3530-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 25, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : tomcat6
CVE ID : CVE-2013-4286 CVE-2013-4322 CVE-2013-4590 CVE-2014-0033
CVE-2014-0075 CVE-2014-0096 CVE-2014-0099 CVE-2014-0119
CVE-2014-0227 CVE-2014-0230 CVE-2014-7810 CVE-2015-5174
CVE-2015-5345 CVE-2015-5346 CVE-2015-5351 CVE-2016-0706
CVE-2016-0714 CVE-2016-0763

Multiple security vulnerabilities have been fixed in the Tomcat servlet
and JSP engine, which may result on bypass of security manager
restrictions, information disclosure, denial of service or session
fixation.

For the oldstable distribution (wheezy), these problems have been fixed
in version 6.0.45+dfsg-1~deb7u1.

We recommend that you upgrade your tomcat6 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQIcBAEBCAAGBQJW9XEHAAoJEBDCk7bDfE42xnwQAJlIK86ARfXtpTlJ844NfNPC
YJMClsIJjpqfSK41TR5OJ/b/XLjsPFtLhCUItr7GKEGTx4qbZ9NnmBufMnvWk2iD
fTOU01K8wWklJ81f7LG4o4i2dMdFZUHiTOjSURTVUgO2zRUggDZDlxu+YCNavDHy
WDGC66bsx/AMdjoK3rFbHFjQ9bpCYK+fR7DB4tFEoiheZCqySJgvIQVO7TYuk6Pv
48UIdWgfAhb1J82wsasx+P6DTOc+dTi+hg07i60FZf/iuT9RSjfTDaJnctDx7Pk+
+Iczk6xOpxx54RjUuQeUUi1yO4cUrCqaRUwbQ/fj47kV+JErSR4hysp4SDi/K7va
HbLibmmX+bet34YvTNs4gqPSCxMnRwiSqAPTXbSFZA+goXz4KQ66B/DcJLL/S3xm
ejN+n33+jVrkvF5tdiBrSD3i0qxrkKLTMb6MxDT7BrSyzrl6heeUoOZ3kq7a1dxv
0mfV0BBvxCQyo7bg0IyfHMGT7YA8ZT0WpT8x+raWDiWCd/+VWDq2u9yQkA2wUL86
S/IUNRyalx7TYaewy4jUXIC5JaaWBAGlAXCDNQCqofRPhXwd33MBQ/1l4aSr0dvR
GAnYg0/Cww2le77OQKVbWSEn0b75RCXBDG9ZOFWAqyJNDP35DPxP9vwLvEdIbA9a
M6DRCPbXWgabDUbYhbB6
=qOb5
-----END PGP SIGNATURE-----
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung