Return-Path: X-Original-To: archive-asf-public-internal@cust-asf2.ponee.io Delivered-To: archive-asf-public-internal@cust-asf2.ponee.io Received: from cust-asf.ponee.io (cust-asf.ponee.io [163.172.22.183]) by cust-asf2.ponee.io (Postfix) with ESMTP id D0B44200CFD for ; Wed, 6 Sep 2017 23:37:43 +0200 (CEST) Received: by cust-asf.ponee.io (Postfix) id CF2EB1609D7; Wed, 6 Sep 2017 21:37:43 +0000 (UTC) Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by cust-asf.ponee.io (Postfix) with SMTP id 46D7A1609BA for ; Wed, 6 Sep 2017 23:37:43 +0200 (CEST) Received: (qmail 29554 invoked by uid 500); 6 Sep 2017 21:37:42 -0000 Mailing-List: contact users-help@tomee.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: users@tomee.apache.org Delivered-To: mailing list users@tomee.apache.org Received: (qmail 29543 invoked by uid 99); 6 Sep 2017 21:37:42 -0000 Received: from pnap-us-west-generic-nat.apache.org (HELO spamd1-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 06 Sep 2017 21:37:42 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd1-us-west.apache.org (ASF Mail Server at spamd1-us-west.apache.org) with ESMTP id A9150C3C35 for ; Wed, 6 Sep 2017 21:37:41 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd1-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: 1.812 X-Spam-Level: * X-Spam-Status: No, score=1.812 tagged_above=-999 required=6.31 tests=[KAM_NUMSUBJECT=0.5, SPF_HELO_PASS=-0.001, URI_HEX=1.313] autolearn=disabled Received: from mx1-lw-eu.apache.org ([10.40.0.8]) by localhost (spamd1-us-west.apache.org [10.40.0.7]) (amavisd-new, port 10024) with ESMTP id GTcOCvGO7faA for ; Wed, 6 Sep 2017 21:37:36 +0000 (UTC) Received: from n4.nabble.com (n4.nabble.com [162.253.133.72]) by mx1-lw-eu.apache.org (ASF Mail Server at mx1-lw-eu.apache.org) with ESMTP id 9AA115F613 for ; Wed, 6 Sep 2017 21:37:36 +0000 (UTC) Received: from mben.nabble.com (localhost [127.0.0.1]) by n4.nabble.com (Postfix) with ESMTP id 249131413C1BC for ; Wed, 6 Sep 2017 14:37:36 -0700 (MST) Date: Wed, 6 Sep 2017 14:37:36 -0700 (MST) From: Jason Core To: users@tomee.apache.org Message-ID: <1504733856147-0.post@n4.nabble.com> Subject: Question Regarding CVE-2013-4444 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable archived-at: Wed, 06 Sep 2017 21:37:44 -0000 To remedy CVE-2013-4444, can users just upgrade their version of Oracle Jav= a to 8 and not have to upgrade their version of TomEE.=20 We are currently on Apache TomEE 1.7.0 In post below it looks as if we can do either =E2=80=93 upgrade TomEE versi= on or upgrade Java version.=20 https://threatpost.com/apache-warns-of-tomcat-remote-code-execution-vulnera= bility/108192/ -- Sent from: http://tomee-openejb.979440.n4.nabble.com/TomEE-Users-f979441.ht= ml