aboutsummaryrefslogtreecommitdiffstats
path: root/english/lts/security/2018/dla-1276.wml
blob: 1e678b19a762d0aecfef7514099297620fc4b36c (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
<define-tag description>LTS security update</define-tag>
<define-tag moreinfo>
<p>Jonas Klempel discovered that, when parsing the AIA-Extension field of
a client certificate, Apache Tomcat Native did not correctly handle
fields longer than 127 bytes. The result of the parsing error was to
skip the
OCSP check. It was therefore possible for client certificates that
should have been rejected (if the OCSP check had been made) to be
accepted. Users not using OCSP checks are not affected by this
vulnerability.</p>

<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
1.1.24-1+deb7u1.</p>

<p>We recommend that you upgrade your tomcat-native packages.</p>

<p>Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
</define-tag>

# do not modify the following line
#include "$(ENGLISHDIR)/lts/security/2018/dla-1276.data"
# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy