| Summary: | tomcat new security issue CVE-2014-0227 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | herman.viaene, pterjan, sysadmin-bugs |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/634232/ | ||
| Whiteboard: | advisory has_procedure MGA4-64-OK MGA4-32-OK | ||
| Source RPM: | tomcat-7.0.54-5.mga5.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2015-02-11 23:06:17 CET
David Walser
2015-02-11 23:06:41 CET
CC:
(none) =>
pterjan Updated packages uploaded for Mageia 4 and Cauldron. Testing procedure: https://bugs.mageia.org/show_bug.cgi?id=8307#c17 Advisory: ======================== Updated tomcat packages fix security vulnerability: In Apache Tomcat 7.x before 7.0.55, it was possible to craft a malformed chunk as part of a chunked request that caused Tomcat to read part of the request body as a new request (CVE-2014-0227). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0227 http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.55 ======================== Updated packages in core/updates_testing: ======================== tomcat-7.0.59-1.mga4 tomcat-admin-webapps-7.0.59-1.mga4 tomcat-docs-webapp-7.0.59-1.mga4 tomcat-javadoc-7.0.59-1.mga4 tomcat-jsvc-7.0.59-1.mga4 tomcat-jsp-2.2-api-7.0.59-1.mga4 tomcat-lib-7.0.59-1.mga4 tomcat-servlet-3.0-api-7.0.59-1.mga4 tomcat-el-2.2-api-7.0.59-1.mga4 tomcat-webapps-7.0.59-1.mga4 from tomcat-7.0.59-1.mga4.src.rpm Version:
Cauldron =>
4 I found also tomcat-log4j with this version number, so I installed that one as well. CC:
(none) =>
herman.viaene MGA4-64 on HP Probook 6555b KDE. No installation issues. Followed procedure as desribed in bug8307 (Comment 1 above). All works OK. Whiteboard:
has_procedure =>
has_procedure MGA4-64-OK MGA4-32 on Acer D620 Xfce No installation issues. Followed procedure as desribed in bug8307 (Comment 1 above). All works OK. Whiteboard:
has_procedure MGA4-64-OK =>
advisory has_procedure MGA4-64-OK MGA4-32-OK Validating. Please push to 4 updates Thanks Keywords:
(none) =>
validated_update An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0081.html Status:
NEW =>
RESOLVED
David Walser
2015-02-20 21:26:15 CET
URL:
(none) =>
http://lwn.net/Vulnerabilities/634232/ This also fixed (also fixed in 7.0.55) CVE-2014-0230: http://lwn.net/Vulnerabilities/644268/ This also fixed CVE-2014-7810: http://lwn.net/Vulnerabilities/646558/ |