Processing commands for cont...@bugs.debian.org: > # add found versions as per LTS triage and upstream information > found 842662 7.0.28-4 Bug #842662 [tomcat7] CVE-2016-0762: Apache Tomcat Realm Timing Attack Marked as found in versions tomcat7/7.0.28-4. > tags 842662 + upstream fixed-upstream Bug #842662 [tomcat7] CVE-2016-0762: Apache Tomcat Realm Timing Attack Added tag(s) upstream and fixed-upstream. > severity 842662 important Bug #842662 [tomcat7] CVE-2016-0762: Apache Tomcat Realm Timing Attack Severity set to 'important' from 'normal' > found 842663 7.0.28-4 Bug #842663 [tomcat7] CVE-2016-5018: Apache Tomcat Security Manager Bypass Marked as found in versions tomcat7/7.0.28-4. > tags 842663 + upstream fixed-upstream Bug #842663 [tomcat7] CVE-2016-5018: Apache Tomcat Security Manager Bypass Added tag(s) upstream and fixed-upstream. > found 842664 7.0.28-4 Bug #842664 [tomcat7] CVE-2016-6794: Apache Tomcat System Property Disclosure Marked as found in versions tomcat7/7.0.28-4. > tags 842664 + upstream fixed-upstream Bug #842664 [tomcat7] CVE-2016-6794: Apache Tomcat System Property Disclosure Added tag(s) upstream and fixed-upstream. > found 842665 7.0.28-4 Bug #842665 [tomcat7] CVE-2016-6796 Apache Tomcat Security Manager Bypass Marked as found in versions tomcat7/7.0.28-4. > tags 842665 + upstream fixed-upstream Bug #842665 [tomcat7] CVE-2016-6796 Apache Tomcat Security Manager Bypass Added tag(s) fixed-upstream and upstream. > retitle 842665 CVE-2016-6796: Apache Tomcat Security Manager Bypass Bug #842665 [tomcat7] CVE-2016-6796 Apache Tomcat Security Manager Bypass Changed Bug title to 'CVE-2016-6796: Apache Tomcat Security Manager Bypass' from 'CVE-2016-6796 Apache Tomcat Security Manager Bypass'. > found 842666 7.0.28-4 Bug #842666 [tomcat7] CVE-2016-6797: Apache Tomcat Unrestricted Access to Global Resources Marked as found in versions tomcat7/7.0.28-4. > tags 842666 + upstream fixed-upstream Bug #842666 [tomcat7] CVE-2016-6797: Apache Tomcat Unrestricted Access to Global Resources Added tag(s) fixed-upstream and upstream. > thanks Stopping processing here.
Please contact me if you need assistance. -- 842662: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842662 842663: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842663 842664: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842664 842665: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842665 842666: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842666 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems __ This is the maintainer address of Debian's Java team <http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-java-maintainers>. Please use debian-j...@lists.debian.org for discussions and questions.