Date: Thu, 15 Nov 2012 04:14:41 GMT From: Bill Cole <freebsdpr-20121114@billmail.scconsult.com> To: freebsd-gnats-submit@FreeBSD.org Subject: ports/173640: www/tomcat6 needs update to 6.0.36 for vulnerability Message-ID: <201211150414.qAF4Efqg073224@red.freebsd.org> Resent-Message-ID: <201211150420.qAF4K1dj075548@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 173640 >Category: ports >Synopsis: www/tomcat6 needs update to 6.0.36 for vulnerability >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: update >Submitter-Id: current-users >Arrival-Date: Thu Nov 15 04:20:00 UTC 2012 >Closed-Date: >Last-Modified: >Originator: Bill Cole >Release: 8.3 >Organization: >Environment: FreeBSD mahatmaarchive.cipherspace.net 8.3-STABLE FreeBSD 8.3-STABLE #10: Mon Nov 12 19:59:28 UTC 2012 root@procyon.cipherspace.net:/usr/obj/usr/src/sys/PROCYON amd64 >Description: Tomcat 6.0.36 corrects a DoS vulnerability. See: http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.36 http://portaudit.freebsd.org/4ca26574-2a2c-11e2-99c7-00a0d181e71d.html So the port won't install without force until it is updated. >How-To-Repeat: >Fix: >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201211150414.qAF4Efqg073224>