-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2725-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff July 18, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : tomcat6 Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2012-3544 CVE-2013-2067 Two security issues have been found in the Tomcat servlet and JSP engine: CVE-2012-3544 The input filter for chunked transfer encodings could trigger high resource consumption through malformed CRLF sequences, resulting in denial of service. CVE-2013-2067 The FormAuthenticator module was vulnerable to session fixation. For the oldstable distribution (squeeze), these problems have been fixed in version 6.0.35-1+squeeze3. This update also provides fixes for CVE-2012-2733,CVE-2012-3546,CVE-2012-4431, CVE-2012-4534,CVE-2012-5885, CVE-2012-5886 and CVE-2012-5887, which were all fixed for stable already. For the stable distribution (wheezy), these problems have been fixed in version 6.0.35-6+deb7u1. For the unstable distribution (sid), these problems will be fixed soon. We recommend that you upgrade your tomcat6 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iEYEARECAAYFAlHoLKoACgkQXm3vHE4uylp56QCff9NXUl0J3tcY6bjyROYrMWh5 kekAoJb3+ErnUADVo4tpir+woaK+7lma =bdVm -----END PGP SIGNATURE-----