[tomcat6] 04/06: Update changelog

Markus Koschany apo-guest at moszumanska.debian.org
Sat Feb 27 15:31:20 GMT 2016


This is an automated email from the git hooks/post-receive script.

apo-guest pushed a commit to branch master
in repository tomcat6.

commit 537c67173566022702fa7322c153882739acf0b7
Author: Markus Koschany <apo at debian.org>
Date:   Sat Feb 27 16:17:15 2016 +0100

    Update changelog
---
 debian/changelog | 34 ++++++++++++++++++++++++++++++++++
 1 file changed, 34 insertions(+)

diff --git a/debian/changelog b/debian/changelog
index daefc9e..6b6c388 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,37 @@
+tomcat6 (6.0.45-1) unstable; urgency=medium
+
+  * Team upload.
+  * Imported Upstream version 6.0.45.
+  * Declare compliance with Debian Policy 3.9.7.
+  * Vcs-fields: Use https.
+  * This update fixes the following security vulnerabilities in the source
+    package. Since src:tomcat6 only builds libservlet2.5-java and
+    documentation, users are not directly affected.
+    - CVE-2015-5174: Directory traversal vulnerability in RequestUtil.java.
+    - CVE-2015-5345: The Mapper component in Apache Tomcat before 6.0.45
+      processes redirects before considering security constraints and Filters.
+    - CVE-2016-0706: Apache Tomcat before 6.0.45 does not place
+      org.apache.catalina.manager.StatusManagerServlet on the
+      org/apache/catalina/core/RestrictedServlets.properties list which allows
+      remote authenticated users to bypass intended SecurityManager
+      restrictions.
+    - CVE-2016-0714: The session-persistence implementation in Apache Tomcat before
+      6.0.45 mishandles session attributes, which allows remote authenticated
+      users to bypass intended SecurityManager restrictions.
+    - CVE-2016-0763: The setGlobalContext method in
+      org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat does
+      not consider whether ResourceLinkFactory.setGlobalContext callers are
+      authorized, which allows remote authenticated users to bypass intended
+      SecurityManager restrictions and read or write to arbitrary application
+      data, or cause a denial of service (application disruption), via a web
+      application that sets a crafted global context.
+    - CVE-2015-5351: The Manager and Host Manager applications in
+      Apache Tomcat establish sessions and send CSRF tokens for arbitrary new
+      requests, which allows remote attackers to bypass a CSRF protection
+      mechanism by using a token.
+
+ -- Markus Koschany <apo at debian.org>  Sat, 27 Feb 2016 16:12:05 +0100
+
 tomcat6 (6.0.41-4) unstable; urgency=medium
 
   * Removed the timstamp from the Javadoc of the Servlet API

-- 
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-java/tomcat6.git



More information about the pkg-java-commits mailing list