drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in Undertow
Name: |
Zwei Probleme in Undertow |
|
ID: |
DSA-3906-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian sid, Debian stretch, Debian buster |
|
Datum: |
Mi, 12. Juli 2017, 06:26 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2670
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2666 |
|
Applikationen: |
Undertow |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3906-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff July 11, 2017 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : undertow CVE ID : CVE-2017-2666 CVE-2017-2670
Two vulnerabilities have been discovered in Undertow, a web server written in Java, which may lead to denial of service or HTTP request smuggling.
For the stable distribution (stretch), these problems have been fixed in version 1.4.8-1+deb9u1.
For the testing distribution (buster), these problems have been fixed in version 1.4.18-1.
For the unstable distribution (sid), these problems have been fixed in version 1.4.18-1.
We recommend that you upgrade your undertow packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlllQZ0ACgkQEMKTtsN8 TjbpFhAAqiHSmiR9jH/7zzBWerIxYahmcdlH1PSREmXOm9NrzucC7rdAZBhZ9W+Y /hWqZZiNqL2lkzFvVnBQvi1zHWhraar0LWCSfVFLCPuYOH830LNZmQXzxAfJSmqB 0SThHYiB7fou2eYT5Zy1Al5d/UmG7lfMLa0Ns7CzwIecA4ZnWGNIjPjEiIseMrvZ CwZgmleGzmvm7mGBul8BH6qcgL1Z0y+Xx/DOv9b3UMbzYlr+JhqeqT464kc9ydyI EhKNjVBYgGuFrgoeg7oU9V+fPzK7+bg5mmpvTu1R1hCFR5euZi3jaT8InDbabFE0 eVVYvZVRUdW6wVtXWE/I04ZXqOmwFvz4pBPJkYKi16wqkt/g8Yt+ST9SL1LZhJTG /j8hW6dnJkHRKoQIevwsZt0WpnrlCWHIISs1h+LQmR748dmkIze7Lug+UuuV+Z+L cvYV05bQO0I2utUyu8p2EQJh+zdFZvg+vHoJAiQSSEiCFJdylLRVbpWp21+SAFmx Oa+D86vVPlv8aBPCoo4xo+YsfpMaE8VS73Cd9XBBxCrYSLAdkobIiedYfcjHOMUN fNqhvCShbRmjArEviV0nGs3S+Li49Xi/TR1nZksrQvZxpZiEd9oSiKb9d+kcqpjS skOmh+zywDrHUCPD/NsYtrK3Os8ttwk0eaZvJYffA2E7vWhotKg= =6F66 -----END PGP SIGNATURE-----
|
|
|
|