Date: Sun, 21 Jun 2015 14:34:44 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 201001] sysutils/logstash: Update to 1.5.1 Message-ID: <bug-201001-13-Cvh8pLc1mZ@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-201001-13@https.bugs.freebsd.org/bugzilla/> References: <bug-201001-13@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201001 Jason Unovitch <jason.unovitch@gmail.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |jason.unovitch@gmail.com --- Comment #3 from Jason Unovitch <jason.unovitch@gmail.com> --- Thanks for the patch. This resolves "Logstash versions 1.4.2 and prior are vulnerable to a directory traversal attack that allows an attacker to over-write files on the server running Logstash." (CVE-2015-4152) reported in bug 200759. -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-201001-13-Cvh8pLc1mZ>