You are here
Home > Preporuke > Sigurnosni nedostaci programskih paketa tomcat7 i tomcat8

Sigurnosni nedostaci programskih paketa tomcat7 i tomcat8

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

– ————————————————————————-
Debian Security Advisory DSA-3892-1 security@debian.org
https://www.debian.org/security/ Sebastien Delafond
June 22, 2017 https://www.debian.org/security/faq
– ————————————————————————-

Package : tomcat7
CVE ID : CVE-2017-5664
Debian Bug : 864447 802312

Aniket Nandkishor Kulkarni discovered that in tomcat7, a servlet and
JSP engine, static error pages used the original request’s HTTP method
to serve content, instead of systematically using the GET method. This
could under certain conditions result in undesirable results,
including the replacement or removal of the custom error page.

For the oldstable distribution (jessie), this problem has been fixed
in version 7.0.56-3+deb8u11.

For the stable distribution (stretch), this problem has been fixed in
version 7.0.72-3.

For the testing distribution (buster), this problem has been fixed
in version 7.0.72-3.

For the unstable distribution (sid), this problem has been fixed in
version 7.0.72-3.

We recommend that you upgrade your tomcat7 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAllLecAACgkQEL6Jg/PV
nWQBtwgAqE4JPW4WYj6FEkF0mA44VlkwkDjBpxpNfpp8Rlv20ElQ0Z+KjH5zQ96U
/x1Fp9+z49RLF56roRdE8/Wfp5ZBySqtZIHn0aTu3hZZnF+6IWIDbLUiMf/EhZmL
jdKdZAoVzDzd7JxX/f6GS8Ndv8RV7iQi+vy+wPnScOPnQCUFiRTjX8tK2RIi7hZj
dCYzwQTMQecC79VGBxlApb2r/0CXYmzhkMGpU5n07yvEHx/qahFp+e396BfAcAk3
oIKoH0e4ZtjdNOwB6L7nslTRdgFDgA+Y4Sx2GEg1OIuib3LhBHkLGAMydepWwm3x
DMiOLKmbbFriKB4xganub1nIhXgnAg==
=47Ti
—–END PGP SIGNATURE—–

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

– ————————————————————————-
Debian Security Advisory DSA-3891-1 security@debian.org
https://www.debian.org/security/ Sebastien Delafond
June 22, 2017 https://www.debian.org/security/faq
– ————————————————————————-

Package : tomcat8
CVE ID : CVE-2017-5664
Debian Bug : 864447 802312

Aniket Nandkishor Kulkarni discovered that in tomcat8, a servlet and
JSP engine, static error pages used the original request’s HTTP method
to serve content, instead of systematically using the GET method. This
could under certain conditions result in undesirable results,
including the replacement or removal of the custom error page.

For the oldstable distribution (jessie), this problem has been fixed
in version 8.0.14-1+deb8u10.

For the stable distribution (stretch), this problem has been fixed in
version 8.5.14-1+deb9u1.

For the testing distribution (buster), this problem has been fixed
in version 8.5.14-2.

For the unstable distribution (sid), this problem has been fixed in
version 8.5.14-2.

We recommend that you upgrade your tomcat8 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAllLebkACgkQEL6Jg/PV
nWSdgAf8DI+H+DgOadJtKp8+kwnPA+thujYMAtvQuBb1zwGWXqFyQ1tjmO8RO4J3
azB7VXsIFfe+k6134H8xP0WBicri58cKvMxuBU3wx819i8iQo3ulYwnw/QSbvh+Q
ny1effvJYttMeCVQ9GCYk8Ex0G5wSTE3pWOyflasA1CVgJD/pgo66TkB2JZcegR3
tQo8cUSYBYL/2NDXs4zllopGbOPiGxvyMATNzblse7cPtj1KBlSrlK0L6/4+k/+y
Y3dzJ2tix2slqgAwu/8+nKA62aXuR/8aGhrI+6ECPDj0bjN/mIoEpxPGOoXT+5Go
uo9QKGYKeixXJUgTaEZWRn/dKh+lSg==
=+/Ux
—–END PGP SIGNATURE—–

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa tomcat6

Otkriveni su sigurnosni nedostaci u programskom paketu tomcat6 za operacijski sustav SUSE. Otkriveni nedostaci potencijalnim napadačima omogućuju otkrivanje osjetljivih informacija,...

Close