Linux Security
    Linux Security
    Linux Security

    Debian: DSA-2890-1: libspring-java security update

    Date 29 Mar 2014
    155
    Posted By LinuxSecurity Advisories
    Two vulnerabilities were discovered in libspring-java, the Debian package for the Java Spring framework. CVE-2014-0054
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2890-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                            Florian Weimer
    March 29, 2014                         https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : libspring-java
    CVE ID         : CVE-2014-0054 CVE-2014-1904
    Debian Bug     : 741604
    
    Two vulnerabilities were discovered in libspring-java, the Debian
    package for the Java Spring framework.
    
    CVE-2014-0054
    
        Jaxb2RootElementHttpMessageConverter in Spring MVC processes
        external XML entities.
    
    CVE-2014-1904
    
        Spring MVC introduces a cross-site scripting vulnerability if the
        action on a Spring form is not specified.
    
    For the stable distribution (wheezy), these problems have been fixed in
    version 3.0.6.RELEASE-6+deb7u3.
    
    For the testing distribution (jessie) and the unstable distribution
    (sid), these problems have been fixed in version 3.0.6.RELEASE-13.
    
    We recommend that you upgrade your libspring-java packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    Advisories

    LinuxSecurity Poll

    No results found.

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.