Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 20 Jul 2015 02:44:34 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 201704] lang/groovy: remote execution of untrusted code vulnerability in 2.3.9
Message-ID:  <bug-201704-13@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201704

            Bug ID: 201704
           Summary: lang/groovy: remote execution of untrusted code
                    vulnerability in 2.3.9
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Some People
          Priority: ---
         Component: Individual Port(s)
          Assignee: freebsd-ports-bugs@FreeBSD.org
          Reporter: jason.unovitch@gmail.com
                CC: mjs@bur.st
             Flags: maintainer-feedback?(mjs@bur.st)
                CC: mjs@bur.st

Maintainer of lang/groovy,

CVE-2015-3253: Remote execution of untrusted code applies to Groovy 1.7.0 to
2.4.3.  The current version of lang/groovy is 2.3.9.  This port will require an
update.

References:
http://www.vuxml.org/freebsd/67b3fef2-2bea-11e5-86ff-14dae9d210b8.html
https://issues.apache.org/jira/browse/GROOVY-7504
http://seclists.org/oss-sec/2015/q3/121
http://groovy-lang.org/security.html

-- 
You are receiving this mail because:
You are the assignee for the bug.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-201704-13>