Bug#781119: jajuk: java.lang.NullPointerException later button quick start menu

2015-03-26 Thread Bertrand Florat
Hi, This release is now very (very) old and no more supported (by the jajuk team). Current version is 1.10.7 and this bug is probably already fixed within (and ok, I still have to find the time to upgrade the Debian package...) Cheers, - Bertrand On 24/03/2015 20:55, Markus Koschany wrote:

Bug#780519: marked as done (tomcat7: FTBFS due to failing tests)

2015-03-26 Thread Debian Bug Tracking System
Your message dated Thu, 26 Mar 2015 12:34:41 + with message-id and subject line Bug#780519: fixed in tomcat7 7.0.56-2 has caused the Debian Bug report #780519, regarding tomcat7: FTBFS due to failing tests to be marked as done. This means that you claim that the problem has been dealt with. I

tomcat7_7.0.56-2_amd64.changes ACCEPTED into unstable

2015-03-26 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 26 Mar 2015 00:15:03 -0300 Source: tomcat7 Binary: tomcat7-common tomcat7 tomcat7-user libtomcat7-java libservlet3.0-java libservlet3.0-java-doc tomcat7-admin tomcat7-examples tomcat7-docs Architecture: source all

Processing of tomcat7_7.0.56-2_amd64.changes

2015-03-26 Thread Debian FTP Masters
tomcat7_7.0.56-2_amd64.changes uploaded successfully to localhost along with the files: tomcat7_7.0.56-2.dsc tomcat7_7.0.56-2.debian.tar.xz tomcat7-common_7.0.56-2_all.deb tomcat7_7.0.56-2_all.deb tomcat7-user_7.0.56-2_all.deb libtomcat7-java_7.0.56-2_all.deb libservlet3.0-java_7.0.56

Bug#780897: wheezy-security update for batik (CVE-2015-0250)

2015-03-26 Thread Sébastien Delafond
On Mar/25, tony mancill wrote: > I have prepared an update for batik [1] in wheezy to address > CVE-2015-0250. Attached is the debdiff. Please let me know if you > would like me to upload it. Hi Tony, I've reviewed your debdiff and it looks good. Please upload to security-master-unembargoed, an

Bug#781223: jenkins: Multiple security issues

2015-03-26 Thread Moritz Muehlenhoff
Package: jenkins Severity: grave Tags: security Justification: user security hole Hi, please see https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-03-23: SECURITY-171 is CVE-2015-1812 SECURITY-177 is CVE-2015-1813 SECURITY-180 is CVE-2015-1814 and