Apache Tomcat 7.x / 8.x / 9.x Information Disclosure

While investigating bug 60718, it was noticed that some calls to application listeners did not use the appropriate facade object. When running an untrusted application under a SecurityManager, it was therefore possible for that untrusted application to retain a reference to the request or response object and thereby access and/or modify information associated with another web application. Apache Tomcat versions 7.0.0 through 7.0.75, 8.0.0.RC1 through 8.0.41, 8.5.0 through 8.5.11, and 9.0.0.M1 through 9.0.0.M17 are affected.

Draw the blinds while surfing online

US President Donald Trump has opened up a new era in online advertising on the heels of his signing off on the new law that allows Internet Service Providers to resell their customer data. It is now time for customers to look at this brave new world and do some hard thinking about their lack […]

The post Draw the blinds while surfing online appeared first on Avira Blog.

Apache Tomcat 8.x / 9.x Refactoring Information Disclosure

The refactoring of the HTTP connectors for 8.5.x onwards, introduced a regression in the send file processing. If the send file processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could result in the same Processor being used for multiple requests which in turn could lead to unexpected errors and/or response mix-up. Apache Tomcat versions 8.5.0 through 8.5.12 and 9.0.0.M1 through 9.0.0.M18 are affected.

CVE-2017-7286

The Linux kernel package 3.16.0-28 on Ubuntu 14.04 LTS mishandles a series of mmap system calls for /dev/zero with different starting addresses, with a stated impact of “allowing for a local user to possibly gain root access,” aka an “inode integer overflow.”

Software and Security Information