-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2207-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff March 30, 2011 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : tomcat5.5 Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2008-5515 CVE-2009-0033 CVE-2009-0580 CVE-2009-0781 CVE-2009-0783 CVE-2009-2693 CVE-2009-2902 CVE-2010-1157 CVE-2010-2227 Various vulnerabilities have been discovered in the Tomcat Servlet and JSP engine, resulting in denial of service, cross-site scripting, information disclosure and WAR file traversal. Further details on the individual security issues can be found at http://tomcat.apache.org/security-5.html. For the oldstable distribution (lenny), this problem has been fixed in version 5.5.26-5lenny2. The stable distribution (squeeze) no longer contains tomcat5.5. tomcat6 is already fixed. The unstable distribution (sid) no longer contains tomcat5.5. tomcat6 is already fixed. We recommend that you upgrade your tomcat5.5 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iEYEARECAAYFAk2SXoYACgkQXm3vHE4uylr4KwCeO42SkJVOeIr/e5stizZ9k+Hr YQAAoOS0ena7LvAKk2gXBBO2k6I7+EKN =h4Ki -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/