MGASA-2017-0196

Source
https://advisories.mageia.org/MGASA-2017-0196.html
Import Source
https://advisories.mageia.org/MGASA-2017-0196.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2017-0196
Related
Published
2017-06-29T21:40:57Z
Modified
2017-06-29T21:25:14Z
Summary
Updated tomcat packages fix security vulnerability
Details

Aniket Nandkishor Kulkarni discovered that in tomcat7, static error pages used the original request's HTTP method to serve content, instead of systematically using the GET method. This could under certain conditions result in undesirable results, including the replacement or removal of the custom error page (CVE-2017-5664).

References
Credits

Affected packages

Mageia:5 / tomcat

Package

Name
tomcat
Purl
pkg:rpm/mageia/tomcat?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.0.78-1.mga5

Ecosystem specific

{
    "section": "core"
}