Bug#787010: tomcat6: CVE-2014-7810: Security Manager bypass by expression language
Santiago Ruano Rincón
santiagorr at riseup.net
Wed May 27 18:03:02 UTC 2015
Source: tomcat6
Version: 6.0.41-2+squeeze6
Severity: normal
Tags: security patch upstream fixed-upstream
Dear Debian Java maintainers,
The Tomcat security team has identified a security issue [cve] that
allows malicious web applications to bypass the Security Manager, by the
use of expression language. The code related to this vulnerability is
present in squeeze and wheezy.
I have prepared the attached patches for squeeze, based on [fix].
[cve] https://security-tracker.debian.org/tracker/CVE-2014-7810
[fix] http://svn.apache.org/viewvc?view=revision&revision=1645366
http://svn.apache.org/viewvc?view=revision&revision=1659538
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
Please adjust the affected versions in the BTS as needed.
Cheers!
Santiago
P.S. This is part of my first security bug reports against tomcat.
Please let me know how can I improve them.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: CVE-2014-7810-1.patch
Type: text/x-diff
Size: 3606 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/pkg-java-maintainers/attachments/20150527/f26836bd/attachment-0002.patch>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: CVE-2014-7810-2.patch
Type: text/x-diff
Size: 5344 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/pkg-java-maintainers/attachments/20150527/f26836bd/attachment-0003.patch>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: Digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-java-maintainers/attachments/20150527/f26836bd/attachment-0001.sig>
More information about the pkg-java-maintainers
mailing list