Date: Mon, 20 Jul 2015 02:44:34 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 201704] lang/groovy: remote execution of untrusted code vulnerability in 2.3.9 Message-ID: <bug-201704-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201704 Bug ID: 201704 Summary: lang/groovy: remote execution of untrusted code vulnerability in 2.3.9 Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Some People Priority: --- Component: Individual Port(s) Assignee: freebsd-ports-bugs@FreeBSD.org Reporter: jason.unovitch@gmail.com CC: mjs@bur.st Flags: maintainer-feedback?(mjs@bur.st) CC: mjs@bur.st Maintainer of lang/groovy, CVE-2015-3253: Remote execution of untrusted code applies to Groovy 1.7.0 to 2.4.3. The current version of lang/groovy is 2.3.9. This port will require an update. References: http://www.vuxml.org/freebsd/67b3fef2-2bea-11e5-86ff-14dae9d210b8.html https://issues.apache.org/jira/browse/GROOVY-7504 http://seclists.org/oss-sec/2015/q3/121 http://groovy-lang.org/security.html -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-201704-13>