CVE-2016-6796

NameCVE-2016-6796
DescriptionA malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-728-1, DLA-729-1, DSA-3720-1, DSA-3721-1
Debian Bugs842665

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tomcat6sourcewheezy6.0.45+dfsg-1~deb7u3DLA-728-1
tomcat6source(unstable)6.0.41-3low
tomcat7sourcewheezy7.0.28-4+deb7u7DLA-729-1
tomcat7sourcejessie7.0.56-3+deb8u5DSA-3721-1
tomcat7source(unstable)7.0.72-1low842665
tomcat8sourcejessie8.0.14-1+deb8u4DSA-3720-1
tomcat8source(unstable)8.0.37-1low

Notes

Since 6.0.41-3, src:tomcat6 only builds a servlet and docs in Jessie
http://markmail.org/message/hynaeawxxhpvvctu?q=list:org.apache.tomcat.announce/
Fixed by: http://svn.apache.org/r1758494 (8.0.x)
Fixed by: http://svn.apache.org/r1758495 (7.0.x)
Fixed by: https://svn.apache.org/viewvc?view=revision&revision=1758496 (6.0.x)

Search for package or bug name: Reporting problems