Debian Security Advisory
DSA-4357-1 libapache-mod-jk -- security update
- Date Reported:
- 20 Dec 2018
- Affected Packages:
- libapache-mod-jk
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2018-11759.
- More information:
-
Raphael Arrouas and Jean Lejeune discovered an access control bypass vulnerability in mod_jk, the Apache connector for the Tomcat Java servlet engine. The vulnerability is addressed by upgrading mod_jk to the new upstream version 1.2.46, which includes additional changes.
- https://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html#Changes_between_1.2.42_and_1.2.43
- https://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html#Changes_between_1.2.43_and_1.2.44
- https://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html#Changes_between_1.2.44_and_1.2.45
- https://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html#Changes_between_1.2.45_and_1.2.46
For the stable distribution (stretch), this problem has been fixed in version 1:1.2.46-0+deb9u1.
We recommend that you upgrade your libapache-mod-jk packages.
For the detailed security status of libapache-mod-jk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libapache-mod-jk