Your message dated Sun, 25 Sep 2022 14:34:43 +0000
with message-id <[email protected]>
and subject line Bug#1020589: fixed in batik 1.15+dfsg-1
has caused the Debian Bug report #1020589,
regarding batik: CVE-2022-38398 CVE-2022-38648 CVE-2022-40146
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1020589: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1020589
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: batik
Version: 1.14-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi,
The following vulnerabilities were published for batik.
CVE-2022-38398[0]:
| Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache
| XML Graphics allows an attacker to load a url thru the jar protocol.
| This issue affects Apache XML Graphics Batik 1.14.
CVE-2022-38648[1]:
| Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache
| XML Graphics allows an attacker to fetch external resources. This
| issue affects Apache XML Graphics Batik 1.14.
CVE-2022-40146[2]:
| Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache
| XML Graphics allows an attacker to access files using a Jar url. This
| issue affects Apache XML Graphics Batik 1.14.
If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2022-38398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38398
https://issues.apache.org/jira/browse/BATIK-1331
http://svn.apache.org/viewvc?view=revision&revision=1903462
[1] https://security-tracker.debian.org/tracker/CVE-2022-38648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38648
https://issues.apache.org/jira/browse/BATIK-1333
http://svn.apache.org/viewvc?view=revision&revision=1903625
[2] https://security-tracker.debian.org/tracker/CVE-2022-40146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40146
https://issues.apache.org/jira/browse/BATIK-1335
http://svn.apache.org/viewvc?view=revision&revision=1903910
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: batik
Source-Version: 1.15+dfsg-1
Done: Pierre Gruet <[email protected]>
We believe that the bug you reported is fixed in the latest version of
batik, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Pierre Gruet <[email protected]> (supplier of updated batik package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 25 Sep 2022 16:00:05 +0200
Source: batik
Architecture: source
Version: 1.15+dfsg-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers
<[email protected]>
Changed-By: Pierre Gruet <[email protected]>
Closes: 1020589
Changes:
batik (1.15+dfsg-1) unstable; urgency=medium
.
* New upstream version, fixing security issues (Closes: #1020589):
- CVE-2022-38398
- CVE-2022-38648
- CVE-2022-40146
* Adding a +dfsg suffix when repacking
* Updating years in d/copyright
* Adding myself as uploader
* Re-export upstream signing key without extra signatures.
* Set upstream metadata fields: Repository, Repository-Browse, Bug-Database
* Adding Lintian overrides for the codeless jars
* Adding DEP-3 headers for the patches
Checksums-Sha1:
138ccd90f558c746cb3d985e2ade04ec7c227360 2192 batik_1.15+dfsg-1.dsc
4cfc6b7eebca982264c8aa2620ce1cefe1dc5430 4229884 batik_1.15+dfsg.orig.tar.xz
f3fb7ddce28959ef4d1ce2e308edcbb048d2821e 30688 batik_1.15+dfsg-1.debian.tar.xz
e2f9e042c6f2935fc3a1357978f61235c08fdb11 15397
batik_1.15+dfsg-1_amd64.buildinfo
Checksums-Sha256:
b9c72ff38352d6d0e0d6e4b234c841bf474ba039c39213824a17d4c7825b760b 2192
batik_1.15+dfsg-1.dsc
507f3c8976fc79d649c576eebc724e4c18eba9b2bd0fdb5f21979d1e2d33f5b2 4229884
batik_1.15+dfsg.orig.tar.xz
1d3c44d7f4eb5e84cc218b7db32b695e9b0cea5d049a8bf3bd12ee1db3c25ae7 30688
batik_1.15+dfsg-1.debian.tar.xz
0d49dd83448285f8e71f13a691c875e21f3b2a72e97e51dda67676b47c03e06f 15397
batik_1.15+dfsg-1_amd64.buildinfo
Files:
2467a53ef800f8a4caf66fd173b94185 2192 java optional batik_1.15+dfsg-1.dsc
ade8e15a7d72989f3e0c0395f1e168c0 4229884 java optional
batik_1.15+dfsg.orig.tar.xz
2900cddedc1cdb30d9f02fccd57b767d 30688 java optional
batik_1.15+dfsg-1.debian.tar.xz
571d4b7646b1199b745db1662f197b1a 15397 java optional
batik_1.15+dfsg-1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=J+Ui
-----END PGP SIGNATURE-----
--- End Message ---
__
This is the maintainer address of Debian's Java team
<https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-java-maintainers>.
Please use
[email protected] for discussions and questions.