Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might
allow remote attackers to discover the server's hostname or IP
address by sending a request for a resource that requires (1) BASIC
or (2) DIGEST authentication, and then reading the realm field in the
WWW-Authenticate header in the reply.
*** Bug 327711 has been marked as a duplicate of this bug. ***
We now have 6.0.28. I think we should start deprecating 5.5 as we don't have anyone interested in maintaining it. Do you do the masking?
Someone please mask, I cannot do it.
5.5 is still considered production upstream and there are still apps that require it :(. It would be nice to have a current version in portage. I tried to make a .31 ebuild myself but had some weird compilation failures that my limited java skills couldn't make sense of. For somebody who knew what they were doing ;) it probably wouldn't take much time to whip out a new working ebuild...
*** This bug has been marked as a duplicate of bug 329937 ***
This issue was resolved and addressed in
GLSA 201206-24 at http://security.gentoo.org/glsa/glsa-201206-24.xml
by GLSA coordinator Tobias Heinlein (keytoaster).