You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa tomcat

Sigurnosni nedostaci programskog paketa tomcat

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2015-2109
2015-02-15 10:49:38
——————————————————————————–

Name : tomcat
Product : Fedora 21
Version : 7.0.59
Release : 1.fc21
URL : http://tomcat.apache.org/
Summary : Apache Servlet/JSP Engine, RI for Servlet 3.0/JSP 2.2 API
Description :
Tomcat is the servlet container that is used in the official Reference
Implementation for the Java Servlet and JavaServer Pages technologies.
The Java Servlet and JavaServer Pages specifications are developed by
Sun under the Java Community Process.

Tomcat is developed in an open and participatory environment and
released under the Apache Software License version 2.0. Tomcat is intended
to be a collaboration of the best-of-breed developers from around the world.

——————————————————————————–
Update Information:

Updated to 7.0.59
——————————————————————————–
ChangeLog:

* Sat Feb 14 2015 Ivan Afonichev <ivan.afonichev@gmail.com> 0:7.0.59-1
– Updated to 7.0.59
* Sun Nov 16 2014 Ivan Afonichev <ivan.afonichev@gmail.com> 0:7.0.57-1
– Updated to 7.0.57
– Substitute libnames in catalina-tasks.xml, resolves: rhbz#1126439
– Use CATALINA_OPTS only on start, resolves: rhbz#1051194
——————————————————————————–
References:

[ 1 ] Bug #1109196 – CVE-2014-0227 Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter
https://bugzilla.redhat.com/show_bug.cgi?id=1109196
[ 2 ] Bug #1088342 – CVE-2014-0096 Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs
https://bugzilla.redhat.com/show_bug.cgi?id=1088342
[ 3 ] Bug #1102030 – CVE-2014-0099 Tomcat/JBossWeb: Request smuggling via malicious content length header
https://bugzilla.redhat.com/show_bug.cgi?id=1102030
[ 4 ] Bug #1072776 – CVE-2014-0075 Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter
https://bugzilla.redhat.com/show_bug.cgi?id=1072776
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update tomcat’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorMarko Stanec
Cert idNCERT-REF-2015-02-0011-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivost programskog paketa e2fsprogs

Otkrivena je ranjivost prekoračenja spremnika gomile u funckiji ext2fs_open2 (lib/ext2fs/openfs.c) u programskom paketu e2fsprogs uzrokovana neodgovarajućim provjeravanjem graničnih vrijednosti parametara....

Close