DSA-3447-1 tomcat7 -- security update

Related Vulnerabilities: CVE-2014-7810   CVE-2013-4444   CVE-2014-0075   CVE-2014-0099   CVE-2014-0227   CVE-2014-0230  

It was discovered that malicious web applications could use the Expression Language to bypass protections of a Security Manager as expressions were evaluated within a privileged code section. For the oldstable distribution (wheezy), this problem has been fixed in version 7.0.28-4+deb7u3. This update also provides fixes for CVE-2013-4444, CVE-2014-0075, CVE-2014-0099, CVE-2014-0227 and CVE-2014-0230, which were all fixed for the stable distribution (jessie) already. For the stable distribution (jessie), this problem has been fixed in version 7.0.56-3+deb8u1. For the testing distribution (stretch), this problem has been fixed in version 7.0.61-1. For the unstable distribution (sid), this problem has been fixed in version 7.0.61-1. We recommend that you upgrade your tomcat7 packages.

Debian Security Advisory

DSA-3447-1 tomcat7 -- security update

Date Reported:
17 Jan 2016
Affected Packages:
tomcat7
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2014-7810.
More information:

It was discovered that malicious web applications could use the Expression Language to bypass protections of a Security Manager as expressions were evaluated within a privileged code section.

For the oldstable distribution (wheezy), this problem has been fixed in version 7.0.28-4+deb7u3. This update also provides fixes for CVE-2013-4444, CVE-2014-0075, CVE-2014-0099, CVE-2014-0227 and CVE-2014-0230, which were all fixed for the stable distribution (jessie) already.

For the stable distribution (jessie), this problem has been fixed in version 7.0.56-3+deb8u1.

For the testing distribution (stretch), this problem has been fixed in version 7.0.61-1.

For the unstable distribution (sid), this problem has been fixed in version 7.0.61-1.

We recommend that you upgrade your tomcat7 packages.