Processing commands for cont...@bugs.debian.org:

> # add found versions as per LTS triage and upstream information
> found 842662 7.0.28-4
Bug #842662 [tomcat7] CVE-2016-0762: Apache Tomcat Realm Timing Attack
Marked as found in versions tomcat7/7.0.28-4.
> tags 842662 + upstream fixed-upstream
Bug #842662 [tomcat7] CVE-2016-0762: Apache Tomcat Realm Timing Attack
Added tag(s) upstream and fixed-upstream.
> severity 842662 important
Bug #842662 [tomcat7] CVE-2016-0762: Apache Tomcat Realm Timing Attack
Severity set to 'important' from 'normal'
> found 842663 7.0.28-4
Bug #842663 [tomcat7] CVE-2016-5018: Apache Tomcat Security Manager Bypass
Marked as found in versions tomcat7/7.0.28-4.
> tags 842663 + upstream fixed-upstream
Bug #842663 [tomcat7] CVE-2016-5018: Apache Tomcat Security Manager Bypass
Added tag(s) upstream and fixed-upstream.
> found 842664 7.0.28-4
Bug #842664 [tomcat7] CVE-2016-6794: Apache Tomcat System Property Disclosure
Marked as found in versions tomcat7/7.0.28-4.
> tags 842664 + upstream fixed-upstream
Bug #842664 [tomcat7] CVE-2016-6794: Apache Tomcat System Property Disclosure
Added tag(s) upstream and fixed-upstream.
> found 842665 7.0.28-4
Bug #842665 [tomcat7] CVE-2016-6796 Apache Tomcat Security Manager Bypass
Marked as found in versions tomcat7/7.0.28-4.
> tags 842665 + upstream fixed-upstream
Bug #842665 [tomcat7] CVE-2016-6796 Apache Tomcat Security Manager Bypass
Added tag(s) fixed-upstream and upstream.
> retitle 842665 CVE-2016-6796: Apache Tomcat Security Manager Bypass
Bug #842665 [tomcat7] CVE-2016-6796 Apache Tomcat Security Manager Bypass
Changed Bug title to 'CVE-2016-6796: Apache Tomcat Security Manager Bypass' 
from 'CVE-2016-6796 Apache Tomcat Security Manager Bypass'.
> found 842666 7.0.28-4
Bug #842666 [tomcat7] CVE-2016-6797: Apache Tomcat Unrestricted Access to 
Global Resources
Marked as found in versions tomcat7/7.0.28-4.
> tags 842666 + upstream fixed-upstream
Bug #842666 [tomcat7] CVE-2016-6797: Apache Tomcat Unrestricted Access to 
Global Resources
Added tag(s) fixed-upstream and upstream.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
842662: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842662
842663: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842663
842664: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842664
842665: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842665
842666: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842666
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems

__
This is the maintainer address of Debian's Java team
<http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-java-maintainers>. 
Please use
debian-j...@lists.debian.org for discussions and questions.

Reply via email to