—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
– ————————————————————————-
Debian Security Advisory DSA-3530-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 25, 2016 https://www.debian.org/security/faq
– ————————————————————————-
Package : tomcat6
CVE ID : CVE-2013-4286 CVE-2013-4322 CVE-2013-4590 CVE-2014-0033
CVE-2014-0075 CVE-2014-0096 CVE-2014-0099 CVE-2014-0119
CVE-2014-0227 CVE-2014-0230 CVE-2014-7810 CVE-2015-5174
CVE-2015-5345 CVE-2015-5346 CVE-2015-5351 CVE-2016-0706
CVE-2016-0714 CVE-2016-0763
Multiple security vulnerabilities have been fixed in the Tomcat servlet
and JSP engine, which may result on bypass of security manager
restrictions, information disclosure, denial of service or session
fixation.
For the oldstable distribution (wheezy), these problems have been fixed
in version 6.0.45+dfsg-1~deb7u1.
We recommend that you upgrade your tomcat6 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=qOb5
—–END PGP SIGNATURE—–