Jump to content
Compatible Support Forums
Sign in to follow this  
news

[Tech ARP] SDRAM Burst Len – BIOS Optimization Gui?= de

Recommended Posts

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-3552-1 security ( -at -) debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

April 17, 2016 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : tomcat7

CVE ID : CVE-2015-5174 CVE-2015-5345 CVE-2015-5346 CVE-2015-5351

CVE-2016-0706 CVE-2016-0714 CVE-2016-0763

 

Multiple security vulnerabilities have been discovered in the Tomcat

servlet and JSP engine, which may result in information disclosure,

the bypass of CSRF protections and bypass of the SecurityManager.

 

For the oldstable distribution (wheezy), these problems have been fixed

in version 7.0.28-4+deb7u4. This update also fixes CVE-2014-0119 and

CVE-2014-0096.

 

For the stable distribution (jessie), these problems have been fixed in

version 7.0.56-3+deb8u2.

 

For the testing distribution (stretch), these problems have been fixed

in version 7.0.68-1.

 

For the unstable distribution (sid), these problems have been fixed in

version 7.0.68-1.

 

We recommend that you upgrade your tomcat7 packages.

 

Further information about Debian Security Advisories, how to apply

these updates to your system and frequently asked questions can be

found at: https://www.debian.org/security/

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×