It was discovered that Tomcat incorrectly handled being configured with HTTP PUTs enabled. A remote attacker could use this issue to upload a JSP file to the server and execute arbitrary code.
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_name": "libservlet3.0-java", "binary_version": "7.0.68-1ubuntu0.4+esm3" }, { "binary_name": "libservlet3.0-java-doc", "binary_version": "7.0.68-1ubuntu0.4+esm3" }, { "binary_name": "libtomcat7-java", "binary_version": "7.0.68-1ubuntu0.4+esm3" }, { "binary_name": "tomcat7", "binary_version": "7.0.68-1ubuntu0.4+esm3" }, { "binary_name": "tomcat7-admin", "binary_version": "7.0.68-1ubuntu0.4+esm3" }, { "binary_name": "tomcat7-common", "binary_version": "7.0.68-1ubuntu0.4+esm3" }, { "binary_name": "tomcat7-docs", "binary_version": "7.0.68-1ubuntu0.4+esm3" }, { "binary_name": "tomcat7-examples", "binary_version": "7.0.68-1ubuntu0.4+esm3" }, { "binary_name": "tomcat7-user", "binary_version": "7.0.68-1ubuntu0.4+esm3" } ] }