—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
– ————————————————————————-
Debian Security Advisory DSA-3787-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 13, 2017 https://www.debian.org/security/faq
– ————————————————————————-
Package : tomcat7
CVE ID : not yet available
Debian Bug : 851304
It was discovered that a programming error in the processing of HTTPS
requests in the Apache Tomcat servlet and JSP engine may result in
denial of service via an infinite loop.
For the stable distribution (jessie), this problem has been fixed in
version 7.0.56-3+deb8u8.
We recommend that you upgrade your tomcat7 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–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=DS1k
—–END PGP SIGNATURE—–
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
– ————————————————————————-
Debian Security Advisory DSA-3788-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 13, 2017 https://www.debian.org/security/faq
– ————————————————————————-
Package : tomcat8
CVE ID : not yet available
Debian Bug : 851304
It was discovered that a programming error in the processing of HTTPS
requests in the Apache Tomcat servlet and JSP engine may result in
denial of service via an infinite loop.
For the stable distribution (jessie), this problem has been fixed in
version 8.0.14-1+deb8u7.
For the unstable distribution (sid), this problem will be fixed soon.
We recommend that you upgrade your tomcat8 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–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=sulk
—–END PGP SIGNATURE—–