Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 15 Nov 2012 04:14:41 GMT
From:      Bill Cole <freebsdpr-20121114@billmail.scconsult.com>
To:        freebsd-gnats-submit@FreeBSD.org
Subject:   ports/173640: www/tomcat6 needs update to 6.0.36 for vulnerability
Message-ID:  <201211150414.qAF4Efqg073224@red.freebsd.org>
Resent-Message-ID: <201211150420.qAF4K1dj075548@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         173640
>Category:       ports
>Synopsis:       www/tomcat6 needs update to 6.0.36 for vulnerability
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          update
>Submitter-Id:   current-users
>Arrival-Date:   Thu Nov 15 04:20:00 UTC 2012
>Closed-Date:
>Last-Modified:
>Originator:     Bill Cole
>Release:        8.3
>Organization:
>Environment:
FreeBSD mahatmaarchive.cipherspace.net 8.3-STABLE FreeBSD 8.3-STABLE #10: Mon Nov 12 19:59:28 UTC 2012     root@procyon.cipherspace.net:/usr/obj/usr/src/sys/PROCYON  amd64

>Description:
Tomcat 6.0.36 corrects a DoS vulnerability. See:

http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.36
http://portaudit.freebsd.org/4ca26574-2a2c-11e2-99c7-00a0d181e71d.html

So the port won't install without force until it is updated. 
>How-To-Repeat:

>Fix:


>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201211150414.qAF4Efqg073224>