Marking parent task as "Won't Fix" since it tracks Jaunty, but leaving
Hardy. On Hardy, this package is in universe and is community supported.
If someone is able, perhaps you could prepare debdiffs to fix this by
following https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures.
** Changed in: tomc
Jaunty is EOL.
** Changed in: tomcat5.5 (Ubuntu Jaunty)
Status: Confirmed => Won't Fix
--
CVE-2009-0781: XSS in tomcat6 and tomcat5.5
https://bugs.launchpad.net/bugs/341278
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubun
Intrepid Ibex reached end-of-life on 30 April 2010 so I am closing the
report. The bug is still marked as confirmed in later versions of Ubuntu.
** Changed in: tomcat5.5 (Ubuntu Intrepid)
Status: Confirmed => Invalid
--
CVE-2009-0781: XSS in tomcat6 and tomcat5.5
https://bugs.launchpad.n
** Branch linked: lp:ubuntu/jaunty-security/tomcat6
--
CVE-2009-0781: XSS in tomcat6 and tomcat5.5
https://bugs.launchpad.net/bugs/341278
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubun
** Changed in: tomcat6 (Ubuntu)
Status: Confirmed => Fix Released
--
CVE-2009-0781: XSS in tomcat6 and tomcat5.5
https://bugs.launchpad.net/bugs/341278
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
u
** Changed in: tomcat6 (Debian)
Status: Unknown => Fix Released
--
CVE-2009-0781: XSS in tomcat6 and tomcat5.5
https://bugs.launchpad.net/bugs/341278
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubu
** Bug watch added: Debian Bug tracker #532362
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=532362
** Also affects: tomcat6 (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=532362
Importance: Unknown
Status: Unknown
--
CVE-2009-0781: XSS in tomcat6 and tomcat5.5
This bug was fixed in the package tomcat6 - 6.0.18-0ubuntu6.1
---
tomcat6 (6.0.18-0ubuntu6.1) jaunty-security; urgency=low
* SECURITY UPDATE: security bypass via specially crafted request
- debian/patches/security-CVE-2008-5515.patch: use only a single
normalise implementa
This bug was fixed in the package tomcat6 - 6.0.18-0ubuntu3.2
---
tomcat6 (6.0.18-0ubuntu3.2) intrepid-security; urgency=low
* SECURITY UPDATE: security bypass via specially crafted request
- debian/patches/security-CVE-2008-5515.patch: use only a single
normalise implemen
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-0781
--
CVE-2009-0781: XSS in tomcat6 and tomcat5.5
https://bugs.launchpad.net/bugs/341278
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
The 18 month support period for Gutsy Gibbon 7.10 has reached its end of life -
http://www.ubuntu.com/news/ubuntu-7.10-eol . As a result, we are closing the
Gutsy task.
** Changed in: tomcat5.5 (Ubuntu Gutsy)
Status: Confirmed => Won't Fix
--
CVE-2009-0781: XSS in tomcat6 and tomcat5.5
ht
** Changed in: tomcat5.5 (Ubuntu Gutsy)
Importance: Undecided => Low
** Changed in: tomcat5.5 (Ubuntu Hardy)
Importance: Undecided => Low
** Changed in: tomcat5.5 (Ubuntu Intrepid)
Importance: Undecided => Low
** Changed in: tomcat5.5 (Ubuntu Jaunty)
Importance: Undecided => Low
**
12 matches
Mail list logo