[Bug 201704] lang/groovy: remote execution of untrusted code vulnerability in 2.3.9
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Mon Aug 10 21:41:15 UTC 2015
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201704
--- Comment #6 from commit-hook at freebsd.org ---
A commit references this bug:
Author: junovitch
Date: Mon Aug 10 21:40:44 UTC 2015
New revision: 393910
URL: https://svnweb.freebsd.org/changeset/ports/393910
Log:
MFH: r393909
lang/groovy: security update 2.3.9 -> 2.4.4
- Add NO_ARCH
- Remove various LICENSE files that were removed upstream
- Remove PDF documentation that was removed upstream
- Switch @dirrm to @dir
- Reset maintainer to ports at FreeBSD.org by private request [1]
PR: 201704
Security: CVE-2015-3253
Security: 67b3fef2-2bea-11e5-86ff-14dae9d210b8
Approved by: mjs at Bur.st (outgoing maintainer) [1], feld (mentor)
Approved by: ports-secteam (feld)
Changes:
_U branches/2015Q3/
branches/2015Q3/lang/groovy/Makefile
branches/2015Q3/lang/groovy/distinfo
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ports-bugs
mailing list