==========================================================================
Ubuntu Security Notice USN-2655-1
June 25, 2015
tomcat6 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in Tomcat.
Software Description:
– tomcat6: Servlet and JSP engine
Details:
It was discovered that Tomcat incorrectly handled data with malformed
chunked transfer coding. A remote attacker could possibly use this issue to
conduct HTTP request smuggling attacks, or cause Tomcat to consume
resources, resulting in a denial of service. (CVE-2014-0227)
It was discovered that Tomcat incorrectly handled HTTP responses occurring
before the entire request body was finished being read. A remote attacker
could possibly use this issue to cause memory consumption, resulting in a
denial of service. (CVE-2014-0230)
It was discovered that the Tomcat Expression Language (EL) implementation
incorrectly handled accessible interfaces implemented by inaccessible
classes. An attacker could possibly use this issue to bypass a
SecurityManager protection mechanism. (CVE-2014-7810)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
libtomcat6-java 6.0.35-1ubuntu3.6
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2655-1
CVE-2014-0227, CVE-2014-0230, CVE-2014-7810
Package Information:
https://launchpad.net/ubuntu/+source/tomcat6/6.0.35-1ubuntu3.6
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=zFjm
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-2654-1
June 25, 2015
tomcat7 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 15.04
– Ubuntu 14.10
– Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in Tomcat.
Software Description:
– tomcat7: Servlet and JSP engine
Details:
It was discovered that the Tomcat XML parser incorrectly handled XML
External Entities (XXE). A remote attacker could possibly use this issue to
read arbitrary files. This issue only affected Ubuntu 14.04 LTS.
(CVE-2014-0119)
It was discovered that Tomcat incorrectly handled data with malformed
chunked transfer coding. A remote attacker could possibly use this issue to
conduct HTTP request smuggling attacks, or cause Tomcat to consume
resources, resulting in a denial of service. This issue only affected
Ubuntu 14.04 LTS. (CVE-2014-0227)
It was discovered that Tomcat incorrectly handled HTTP responses occurring
before the entire request body was finished being read. A remote attacker
could possibly use this issue to cause memory consumption, resulting in a
denial of service. This issue only affected Ubuntu 14.04 LTS.
(CVE-2014-0230)
It was discovered that the Tomcat Expression Language (EL) implementation
incorrectly handled accessible interfaces implemented by inaccessible
classes. An attacker could possibly use this issue to bypass a
SecurityManager protection mechanism. (CVE-2014-7810)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.04:
libtomcat7-java 7.0.56-2ubuntu0.1
Ubuntu 14.10:
libtomcat7-java 7.0.55-1ubuntu0.2
Ubuntu 14.04 LTS:
libtomcat7-java 7.0.52-1ubuntu0.3
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2654-1
CVE-2014-0119, CVE-2014-0227, CVE-2014-0230, CVE-2014-7810
Package Information:
https://launchpad.net/ubuntu/+source/tomcat7/7.0.56-2ubuntu0.1
https://launchpad.net/ubuntu/+source/tomcat7/7.0.55-1ubuntu0.2
https://launchpad.net/ubuntu/+source/tomcat7/7.0.52-1ubuntu0.3
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=31aZ
—–END PGP SIGNATURE—–
—