MGASA-2017-0352

Source
https://advisories.mageia.org/MGASA-2017-0352.html
Import Source
https://advisories.mageia.org/MGASA-2017-0352.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0352
Related
Published
2017-09-21T13:43:32Z
Modified
2017-09-21T13:08:24Z
Summary
Updated tomcat packages fix security vulnerability
Details

The CORS Filter did not add an HTTP Vary header indicating that the response varies depending on Origin. This permitted client and server side cache poisoning in some circumstances (CVE-2017-7674).

When using a VirtualDirContext it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request (CVE-2017-12616).

Note that CVE-2017-12616 only affected tomcat 7 in Mageia 5.

References
Credits

Affected packages

Mageia:6 / tomcat

Package

Name
tomcat
Purl
pkg:rpm/mageia/tomcat?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.0.46-1.mga6

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / tomcat

Package

Name
tomcat
Purl
pkg:rpm/mageia/tomcat?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.0.81-1.mga5

Ecosystem specific

{
    "section": "core"
}