tomcat7_7.0.62-1_amd64.changes ACCEPTED into unstable

2015-05-27 Thread Debian FTP Masters


Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Wed, 27 May 2015 11:43:31 +0200
Source: tomcat7
Binary: tomcat7-common tomcat7 tomcat7-user libtomcat7-java libservlet3.0-java 
libservlet3.0-java-doc tomcat7-admin tomcat7-examples tomcat7-docs
Architecture: source all
Version: 7.0.62-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers 
pkg-java-maintainers@lists.alioth.debian.org
Changed-By: Emmanuel Bourg ebo...@apache.org
Description:
 libservlet3.0-java - Servlet 3.0 and JSP 2.2 Java API classes
 libservlet3.0-java-doc - Servlet 3.0 and JSP 2.2 Java API documentation
 libtomcat7-java - Servlet and JSP engine -- core libraries
 tomcat7- Servlet and JSP engine
 tomcat7-admin - Servlet and JSP engine -- admin web applications
 tomcat7-common - Servlet and JSP engine -- common files
 tomcat7-docs - Servlet and JSP engine -- documentation
 tomcat7-examples - Servlet and JSP engine -- example web applications
 tomcat7-user - Servlet and JSP engine -- tools to create user instances
Changes:
 tomcat7 (7.0.62-1) unstable; urgency=medium
 .
   * New upstream release
 - Refreshed the patches
   * Replaced the date in ServerInfo.properties and in the documentation
 with the latest date in debian/changelog to make the build reproducible
   * debian/rules:
 - Modified to use the dh sequencer
 - Simplified the ant invocation and moved some properties
   to debian/ant.properties
 - Do not set the version.* properties already defined
   in build.properties.default
 - Renamed T_VER to VERSION
 - Removed the RWFILES and RWLOC variables
 - Merged the ANT_ARGS and ANT_INVOKE variables
 - No longer remove the long gone .svn directories under
   /usr/share/tomcat8/webapps/default_root
 - Let dh_fixperms set the permissions instead of calling chmod +x
 - Use debian/tomcat7-user.manpages instead of calling dh_installman
 - Updated the copyright year in the Javadoc
Checksums-Sha1:
 527018ed73badc8a4f1c87ab775bc347d4d5c518 2743 tomcat7_7.0.62-1.dsc
 414862e69badbcf1a1aa74263fb93d645697d5b6 2947964 tomcat7_7.0.62.orig.tar.xz
 7321b08cc86bed562e0546c5571cab9ab0d343fd 66444 tomcat7_7.0.62-1.debian.tar.xz
 836dae6e8887e6cdc8899fba0fa3a31f8a7a7439 61636 tomcat7-common_7.0.62-1_all.deb
 308aeb25df70e7e5337d88c8daa26a109e0b478f 50432 tomcat7_7.0.62-1_all.deb
 6b695f5242e3e0e4568736606e11fe01455f87e0 38070 tomcat7-user_7.0.62-1_all.deb
 a2d9812e2071c08a3f44caaac8b6a009df4905c0 3666716 
libtomcat7-java_7.0.62-1_all.deb
 24db6233240e06278a952edfb411c7051af5bd7d 313816 
libservlet3.0-java_7.0.62-1_all.deb
 3837187a10635353b8818d160544ced224d07367 205238 
libservlet3.0-java-doc_7.0.62-1_all.deb
 d8f6a9f5a7406aed11c1d17c3544a21a87bb20c2 39010 tomcat7-admin_7.0.62-1_all.deb
 6c2d9f698004892f0102fb96dfc712955394468f 197612 
tomcat7-examples_7.0.62-1_all.deb
 90ed8582dd3f7bb9ff687e09a11597b5742f9203 618030 tomcat7-docs_7.0.62-1_all.deb
Checksums-Sha256:
 965e324d34d1a96febb1c5087bba9e7b7b3161255b5625af933f1097bc7dc512 2743 
tomcat7_7.0.62-1.dsc
 eb11ce945de514846cc2c141abee8b1922943039c057207c92007068bca61d5e 2947964 
tomcat7_7.0.62.orig.tar.xz
 e2ea27deb15bc4754929ee9286b656ffc455ad9f40e7f66b8728d4d068d71af4 66444 
tomcat7_7.0.62-1.debian.tar.xz
 528f59b197e3e1e98ee6eca9aaf4f2903f5b0cb8b6ef8eaf749500d5f3211b32 61636 
tomcat7-common_7.0.62-1_all.deb
 fd1e472d1a50222fae2bc68b37569905ea3dfa955a6993b6a4c655c632c62c20 50432 
tomcat7_7.0.62-1_all.deb
 4aaf891d9e9f95654d7ea6bbdad1421f16c7c48741d3734936247fe44c769426 38070 
tomcat7-user_7.0.62-1_all.deb
 2a7852582b532f62eb265147b109d71156becd5f1088a85cfdfe1cacd137cbd9 3666716 
libtomcat7-java_7.0.62-1_all.deb
 9e7f0fc2a3c9b5fc4f95b0fcfd37b56cf9228c5271ae195d00746db498eef245 313816 
libservlet3.0-java_7.0.62-1_all.deb
 c5644cbb8a656eb228e1dfaeeac03f1271ed100fae3bb891760f951cdf9898ce 205238 
libservlet3.0-java-doc_7.0.62-1_all.deb
 c5b4de878b8151630aa3526ff30d4ee201b65eaf842c2ff0c0649b4a448fa4e0 39010 
tomcat7-admin_7.0.62-1_all.deb
 03dccb0f0980bfd117f68d198fb0c96a2e73d3f197ff28b260aa017976622535 197612 
tomcat7-examples_7.0.62-1_all.deb
 08fea9cba5ada4171a5b113e092cab6cd1a23361554289e7e2b7cae0b3f43c77 618030 
tomcat7-docs_7.0.62-1_all.deb
Files:
 4034d3bd29ef1944d6820ca2a9ce0e5f 2743 java optional tomcat7_7.0.62-1.dsc
 7eb6e07600ade776ac76d3925f06e194 2947964 java optional 
tomcat7_7.0.62.orig.tar.xz
 973a90799846027205cdebedf129844a 66444 java optional 
tomcat7_7.0.62-1.debian.tar.xz
 e87efc6127530e48833cfec6c5edcc95 61636 java optional 
tomcat7-common_7.0.62-1_all.deb
 056d4cbb3570c1014e2029e6895419f2 50432 java optional tomcat7_7.0.62-1_all.deb
 a89988f21976dd412b444f79d9095b56 38070 java optional 
tomcat7-user_7.0.62-1_all.deb
 8870b1f53c81f6a26e39dcc870faab6a 3666716 java optional 
libtomcat7-java_7.0.62-1_all.deb
 904e912869f4febc552f6e9c91008c21 313816 java optional 
libservlet3.0-java_7.0.62-1_all.deb
 9c746fafc7c423568e27e8e7512b2de8 205238 doc optional 

Processing of tomcat7_7.0.62-1_amd64.changes

2015-05-27 Thread Debian FTP Masters
tomcat7_7.0.62-1_amd64.changes uploaded successfully to localhost
along with the files:
  tomcat7_7.0.62-1.dsc
  tomcat7_7.0.62.orig.tar.xz
  tomcat7_7.0.62-1.debian.tar.xz
  tomcat7-common_7.0.62-1_all.deb
  tomcat7_7.0.62-1_all.deb
  tomcat7-user_7.0.62-1_all.deb
  libtomcat7-java_7.0.62-1_all.deb
  libservlet3.0-java_7.0.62-1_all.deb
  libservlet3.0-java-doc_7.0.62-1_all.deb
  tomcat7-admin_7.0.62-1_all.deb
  tomcat7-examples_7.0.62-1_all.deb
  tomcat7-docs_7.0.62-1_all.deb

Greetings,

Your Debian queue daemon (running on host franck.debian.org)

__
This is the maintainer address of Debian's Java team
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-java-maintainers. 
Please use
debian-j...@lists.debian.org for discussions and questions.


Bug#787010: tomcat6: CVE-2014-7810: Security Manager bypass by expression language

2015-05-27 Thread Santiago Ruano Rincón
Source: tomcat6
Version: 6.0.41-2+squeeze6
Severity: normal
Tags: security patch upstream fixed-upstream

Dear Debian Java maintainers,

The Tomcat security team has identified a security issue [cve] that
allows malicious web applications to bypass the Security Manager, by the
use of expression language. The code related to this vulnerability is
present in squeeze and wheezy.

I have prepared the attached patches for squeeze, based on [fix].

[cve] https://security-tracker.debian.org/tracker/CVE-2014-7810
[fix] http://svn.apache.org/viewvc?view=revisionrevision=1645366
  http://svn.apache.org/viewvc?view=revisionrevision=1659538

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities  Exposures) id in your changelog entry.

Please adjust the affected versions in the BTS as needed.

Cheers!

Santiago

P.S. This is part of my first security bug reports against tomcat.
Please let me know how can I improve them.
Description: Fix potential BeanELResolver issue when running under a security manager.
 Some classes may not be accessible but may have accessible interfaces.
 This is part of the fix for CVE-2014-7810
Origin: http://svn.apache.org/viewvc?view=revisionrevision=1645366

--- a/java/javax/el/BeanELResolver.java
+++ b/java/javax/el/BeanELResolver.java
@@ -188,25 +188,49 @@
 		return null;
 	}
 
-	protected final static class BeanProperties {
-		private final MapString, BeanProperty properties;
+protected final static class BeanProperties {
+private final MapString, BeanProperty properties;
 
-		private final Class? type;
+private final Class? type;
 
-		public BeanProperties(Class? type) throws ELException {
-			this.type = type;
-			this.properties = new HashMapString, BeanProperty();
-			try {
-BeanInfo info = Introspector.getBeanInfo(this.type);
-PropertyDescriptor[] pds = info.getPropertyDescriptors();
-for (int i = 0; i  pds.length; i++) {
-	this.properties.put(pds[i].getName(), new BeanProperty(
-			type, pds[i]));
-}
-			} catch (IntrospectionException ie) {
-throw new ELException(ie);
-			}
-		}
+public BeanProperties(Class? type) throws ELException {
+this.type = type;
+this.properties = new HashMapString, BeanProperty();
+try {
+BeanInfo info = Introspector.getBeanInfo(this.type);
+PropertyDescriptor[] pds = info.getPropertyDescriptors();
+for (PropertyDescriptor pd: pds) {
+this.properties.put(pd.getName(), new BeanProperty(type, pd));
+}
+if (System.getSecurityManager() != null) {
+// When running with SecurityManager, some classes may be
+// not accessible, but have accessible interfaces.
+populateFromInterfaces(type);
+}
+} catch (IntrospectionException ie) {
+throw new ELException(ie);
+}
+}
+
+private void populateFromInterfaces(Class? aClass) throws IntrospectionException {
+Class? interfaces[] = aClass.getInterfaces();
+if (interfaces.length  0) {
+for (Class? ifs : interfaces) {
+BeanInfo info = Introspector.getBeanInfo(ifs);
+PropertyDescriptor[] pds = info.getPropertyDescriptors();
+for (PropertyDescriptor pd : pds) {
+if (!this.properties.containsKey(pd.getName())) {
+this.properties.put(pd.getName(), new BeanProperty(
+this.type, pd));
+}
+}
+}
+}
+Class? superclass = aClass.getSuperclass();
+if (superclass != null) {
+populateFromInterfaces(superclass);
+}
+}
 
 		private BeanProperty get(ELContext ctx, String name) {
 			BeanProperty property = this.properties.get(name);
--- a/webapps/docs/changelog.xml
+++ b/webapps/docs/changelog.xml
@@ -952,6 +952,15 @@
   /fix
 /changelog
   /subsection
+  subsection name=Jasper
+changelog
+  fix
+Fix potential issue with BeanELResolver when running under a security
+manager. Some classes may not be accessible but may have accessible
+interfaces. (markt)
+  /fix
+/changelog
+  /subsection
   subsection name=Web applications
 changelog
   fix
Description: Backport some Jasper clean-up that might provide a marginal performance improvement.
 Even if it doesn't it removes some unnecessary code.
 This is part of the fix for CVE-2014-7810
Origin: http://svn.apache.org/viewvc?view=revisionrevision=1659538

--- a/java/org/apache/jasper/runtime/PageContextImpl.java
+++ b/java/org/apache/jasper/runtime/PageContextImpl.java
@@ -5,9 +5,9 @@
  * The ASF licenses this file to You under the Apache License, Version 2.0
  * (the 

Processed: found 787010 in 6.0.41-1

2015-05-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 found 787010 6.0.41-1
Bug #787010 [src:tomcat6] tomcat6: CVE-2014-7810: Security Manager bypass by 
expression language
Marked as found in versions tomcat6/6.0.41-1.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
787010: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787010
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems

__
This is the maintainer address of Debian's Java team
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-java-maintainers. 
Please use
debian-j...@lists.debian.org for discussions and questions.


Processed: found 787010 in 6.0.35-1, fixed 787010 in 6.0.41-3

2015-05-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 found 787010 6.0.35-1
Bug #787010 [src:tomcat6] tomcat6: CVE-2014-7810: Security Manager bypass by 
expression language
Marked as found in versions tomcat6/6.0.35-1.
 # some version tracking update for the BTS
 fixed 787010 6.0.41-3
Bug #787010 [src:tomcat6] tomcat6: CVE-2014-7810: Security Manager bypass by 
expression language
Marked as fixed in versions tomcat6/6.0.41-3.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
787010: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787010
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems

__
This is the maintainer address of Debian's Java team
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-java-maintainers. 
Please use
debian-j...@lists.debian.org for discussions and questions.


libxmpcore-java 5.1.2-3 MIGRATED to testing

2015-05-27 Thread Debian testing watch
FYI: The status of the libxmpcore-java source package
in Debian's testing distribution has changed.

  Previous version: 5.1.2-2
  Current version:  5.1.2-3

-- 
This email is automatically generated once a day.  As the installation of
new packages into testing happens multiple times a day you will receive
later changes on the next day.
See https://release.debian.org/testing-watch/ for more information.

__
This is the maintainer address of Debian's Java team
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-java-maintainers. 
Please use
debian-j...@lists.debian.org for discussions and questions.


Processed: Re: jruby: has poor cryptographic support

2015-05-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 743746 + confirmed
Bug #743746 [jruby] jruby: has poor cryptographic support
Added tag(s) confirmed.
 owner 743746 !
Bug #743746 [jruby] jruby: has poor cryptographic support
Owner recorded as Miguel Landaeta nomad...@debian.org.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
743746: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=743746
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems

__
This is the maintainer address of Debian's Java team
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-java-maintainers. 
Please use
debian-j...@lists.debian.org for discussions and questions.


Bug#743746: jruby: has poor cryptographic support

2015-05-27 Thread Miguel Landaeta
tags 743746 + confirmed
owner 743746 !
thanks

On Sat, Apr 05, 2014 at 09:52:25PM +, brian m. carlson wrote:
 Package: jruby
 Version: 1.5.6-7
 Severity: normal
 
 JRuby has really bad cryptographic support.  First, many algorithms are
 missing.  The output directs me to the jruby-openssl gem, but that isn't
 packaged.  If JRuby requires that gem in order to be as functional as
 MRI, then it needs to be packaged and be an appropriate dependency (at
 least a Recommends, if not a Depends) of jruby.  In this era,
 cryptography is not an optional component.

Hi Brian,

Sorry for the delay to answer this issue.

We (pkg-java team) intend to upload very soon an updated package with
a new upstream release (1.7.19).

I'm aware of this issue, jruby-openssl needs to be packaged and we
take care of it soon.

Thanks,

-- 
Miguel Landaeta, nomadium at debian.org
secure email with PGP 0x6E608B637D8967E9 available at http://miguel.cc/key.
Faith means not wanting to know what is true. -- Nietzsche


signature.asc
Description: Digital signature
__
This is the maintainer address of Debian's Java team
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-java-maintainers. 
Please use
debian-j...@lists.debian.org for discussions and questions.

glassfish 1:2.1.1-b31g+dfsg1-3 MIGRATED to testing

2015-05-27 Thread Debian testing watch
FYI: The status of the glassfish source package
in Debian's testing distribution has changed.

  Previous version: 1:2.1.1-b31g+dfsg1-2
  Current version:  1:2.1.1-b31g+dfsg1-3

-- 
This email is automatically generated once a day.  As the installation of
new packages into testing happens multiple times a day you will receive
later changes on the next day.
See https://release.debian.org/testing-watch/ for more information.

__
This is the maintainer address of Debian's Java team
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-java-maintainers. 
Please use
debian-j...@lists.debian.org for discussions and questions.


libzeus-jscl-java_1.72-1_amd64.changes REJECTED

2015-05-27 Thread Thorsten Alteholz

Hi Andreas,

please take care of src/gr/zeus/res/eclipse-icons-license.txt

Thanks!
 Thorsten

===

Please feel free to respond to this email if you don't understand why
your files were rejected, or if you upload new files which address our
concerns.


__
This is the maintainer address of Debian's Java team
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-java-maintainers. 
Please use
debian-j...@lists.debian.org for discussions and questions.


japi-compliance-checker 1.4.1-1 MIGRATED to testing

2015-05-27 Thread Debian testing watch
FYI: The status of the japi-compliance-checker source package
in Debian's testing distribution has changed.

  Previous version: 1.3.7-1
  Current version:  1.4.1-1

-- 
This email is automatically generated once a day.  As the installation of
new packages into testing happens multiple times a day you will receive
later changes on the next day.
See https://release.debian.org/testing-watch/ for more information.

__
This is the maintainer address of Debian's Java team
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-java-maintainers. 
Please use
debian-j...@lists.debian.org for discussions and questions.


Processed: your mail

2015-05-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 owner 663342 !
Bug #663342 [jruby] jruby: Please add /usr/lib/ruby/vendor_ruby to the default 
$LOAD_PATH
Owner recorded as Miguel Landaeta nomad...@debian.org.
 tags 663342 + confirmed pending
Bug #663342 [jruby] jruby: Please add /usr/lib/ruby/vendor_ruby to the default 
$LOAD_PATH
Added tag(s) confirmed and pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
663342: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=663342
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems

__
This is the maintainer address of Debian's Java team
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-java-maintainers. 
Please use
debian-j...@lists.debian.org for discussions and questions.


Processing of libzeus-jscl-java_1.72-1_amd64.changes

2015-05-27 Thread Debian FTP Masters
libzeus-jscl-java_1.72-1_amd64.changes uploaded successfully to localhost
along with the files:
  libzeus-jscl-java_1.72-1.dsc
  libzeus-jscl-java_1.72.orig.tar.xz
  libzeus-jscl-java_1.72-1.debian.tar.xz
  libzeus-jscl-java-doc_1.72-1_all.deb
  libzeus-jscl-java_1.72-1_all.deb

Greetings,

Your Debian queue daemon (running on host franck.debian.org)

__
This is the maintainer address of Debian's Java team
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-java-maintainers. 
Please use
debian-j...@lists.debian.org for discussions and questions.


Re: libzeus-jscl-java_1.72-1_amd64.changes REJECTED

2015-05-27 Thread Andreas Tille
Done.
Thanks for checking

Andreas.

On Wed, May 27, 2015 at 05:00:13PM +, Thorsten Alteholz wrote:
 
 Hi Andreas,
 
 please take care of src/gr/zeus/res/eclipse-icons-license.txt
 
 Thanks!
  Thorsten
 
 ===
 
 Please feel free to respond to this email if you don't understand why
 your files were rejected, or if you upload new files which address our
 concerns.
 
 

-- 
http://fam-tille.de

__
This is the maintainer address of Debian's Java team
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-java-maintainers. 
Please use
debian-j...@lists.debian.org for discussions and questions.


Bug#663342: /usr/lib/ruby/vendor_ruby now in $LOAD_PATH

2015-05-27 Thread Potter, Tim (Cloud Services)
It looks like this has been fixed, at least in sid:

root@56264f4d8fa9:/Source/pkg-java/jruby# cat /etc/issue
Debian GNU/Linux 8 \n \l

root@56264f4d8fa9:/Source/pkg-java/jruby# ruby -v
ruby 2.1.5p273 (2014-11-13) [x86_64-linux-gnu]

root@56264f4d8fa9:/Source/pkg-java/jruby# irb
irb(main):001:0 puts $LOAD_PATH
/usr/local/lib/site_ruby/2.1.0
/usr/local/lib/x86_64-linux-gnu/site_ruby
/usr/local/lib/site_ruby
/usr/lib/ruby/vendor_ruby/2.1.0
/usr/lib/x86_64-linux-gnu/ruby/vendor_ruby/2.1.0
/usr/lib/ruby/vendor_ruby
/usr/lib/ruby/2.1.0
/usr/lib/x86_64-linux-gnu/ruby/2.1.0
= nil



smime.p7s
Description: S/MIME cryptographic signature
__
This is the maintainer address of Debian's Java team
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-java-maintainers. 
Please use
debian-j...@lists.debian.org for discussions and questions.

libzeus-jscl-java_1.72-1_amd64.changes is NEW

2015-05-27 Thread Debian FTP Masters
binary:libzeus-jscl-java is NEW.
binary:libzeus-jscl-java-doc is NEW.
source:libzeus-jscl-java is NEW.

Your package has been put into the NEW queue, which requires manual action
from the ftpteam to process. The upload was otherwise valid (it had a good
OpenPGP signature and file hashes are valid), so please be patient.

Packages are routinely processed through to the archive, and do feel
free to browse the NEW queue[1].

If there is an issue with the upload, you will recieve an email from a
member of the ftpteam.

If you have any questions, you may reply to this email.

[1]: https://ftp-master.debian.org/new.html

__
This is the maintainer address of Debian's Java team
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-java-maintainers. 
Please use
debian-j...@lists.debian.org for discussions and questions.