Source: tomcat6
Version: 6.0.35-6+deb7u1
Severity: important
Tags: security patch upstream fixed-upstream
Hi there,
The following vulnerability affects current tomcat 6.x in squeeze and wheezy.
According to CVE-2014-0227 [cve], "Apache Tomcat 6.x before 6.0.42, 7.x before
7.0.55, and 8.x before
Source: tomcat6
Version: 6.0.41-2+squeeze6
Severity: normal
Tags: security upstream fixed-upstream
Hello,
The following vulnerability affects tomcat6 in squeeze and wheezy.
CVE-2014-0230 [cve]: Tomcat permits a limited Denial of Service.
I have prepared the attached patch for the 6.0.41-2+squee
Mapping wheezy to oldstable.
Mapping oldstable to oldstable-proposed-updates.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 15 Apr 2015 21:24:48 +0200
Source: commons-httpclient
Binary: libcommons-httpclient-java libcommons-httpclient-java-doc
Architecture: sou
commons-httpclient_3.1-10.2+deb7u1_amd64.changes uploaded successfully to
localhost
along with the files:
commons-httpclient_3.1-10.2+deb7u1.dsc
commons-httpclient_3.1-10.2+deb7u1.debian.tar.gz
libcommons-httpclient-java_3.1-10.2+deb7u1_all.deb
libcommons-httpclient-java-doc_3.1-10.2+deb7u
4 matches
Mail list logo