You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa undertow

Sigurnosni nedostaci programskog paketa undertow

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LDE

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

– ————————————————————————-
Debian Security Advisory DSA-3906-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
July 11, 2017 https://www.debian.org/security/faq
– ————————————————————————-

Package : undertow
CVE ID : CVE-2017-2666 CVE-2017-2670

Two vulnerabilities have been discovered in Undertow, a web server
written in Java, which may lead to denial of service or HTTP request
smuggling.

For the stable distribution (stretch), these problems have been fixed in
version 1.4.8-1+deb9u1.

For the testing distribution (buster), these problems have been fixed
in version 1.4.18-1.

For the unstable distribution (sid), these problems have been fixed in
version 1.4.18-1.

We recommend that you upgrade your undertow packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
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=6F66
—–END PGP SIGNATURE—–

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-07-0060-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa spice

Otkriven je sigurnosni nedostatak u programskom paketu spice za operacijski sustav SUSE. Otkriveni nedostatak potencijalnim napadačima omogućuje izvršavanje proizvoljnog programskog...

Close