|
|
Subscribe / Log in / New account

Mageia alert MGASA-2017-0400 (tomcat)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2017-0400: Updated tomcat packages fix security vulnerability
Date:  Thu, 2 Nov 2017 22:47:50 +0100
Message-ID:  <20171102214750.4FFF79FCA1@duvel.mageia.org>

MGASA-2017-0400 - Updated tomcat packages fix security vulnerability Publication date: 02 Nov 2017 URL: https://advisories.mageia.org/MGASA-2017-0400.html Type: security Affected Mageia releases: 5, 6 CVE: CVE-2017-12617 Description: When running with HTTP PUTs enabled (e.g. via setting the readonly initialization parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server (CVE-2017-12617). References: - https://bugs.mageia.org/show_bug.cgi?id=21933 - https://tomcat.apache.org/security-7.html#Fixed_in_Apache... - https://tomcat.apache.org/security-8.html#Fixed_in_Apache... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1... SRPMS: - 5/core/tomcat-7.0.82-1.mga5 - 6/core/tomcat-8.0.47-1.mga6


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds