Bug#649476: fop: Failure confirmed with 1:1.0.dfsg2-3 but not with 1:0.95.dfsg-11

2011-12-07 Thread Raphael Hertzog
On Wed, 07 Dec 2011, Vincent Hobeika wrote: I confirm this bug for 1:1.0.dfsg2-3. However on 1:0.95.dfsg-11 I was able to produce the User Guide.pdf without any problem. Yes, the build used to work with the old fop. I have started a thread on fop users mailing list. We are trying to find the

Bug#549737: libgnucrypto-java: FTBFS: rm: cannot remove `debian/libgnucrypto-java/usr/share/info/dir': No such file or directory

2009-10-26 Thread Raphael Hertzog
On Mon, 26 Oct 2009, Lucas Nussbaum wrote: No, the build was done with version 1.15.4. You need to build-depend on install-info, which is no longer provided directly by dpkg. dpkg people, wouldn't it make sense to depend on install-info in dpkg, No, the whole point of using Breaks against

Bug#762444: Insecure certificate validation CVE-2014-3596

2014-09-22 Thread Raphael Hertzog
Package: axis Severity: grave Tags: security Hi, the following vulnerability was published for axis. CVE-2014-3596[0]: | The getCN function in Apache Axis 1.4 and earlier does not properly | verify that the server hostname matches a domain name in the subject's | Common Name (CN) or

Bug#758086: CVE-2012-6153: Apache HttpComponents client: Hostname verification susceptible to MITM attack

2014-09-22 Thread Raphael Hertzog
Hi, On Mon, 18 Aug 2014, Salvatore Bonaccorso wrote: On Thu, Aug 14, 2014 at 11:43:32PM +0200, Emmanuel Bourg wrote: Is there an example available somewhere of a subject improperly parsed by commons-httpclient/3.1-10.2? This would help backporting the fix to this version. I think this

Glassfish security support (in Squeeze)

2014-09-22 Thread Raphael Hertzog
Hello, while triaging CVE affecting Debian Squeeze I came on glassfish: https://security-tracker.debian.org/tracker/source-package/glassfish From what I gathered, Oracle doesn't provide any useful information to apply a targeted fix on the current package. The 2.1.x branch is also no longer

Re: Glassfish security support (in Squeeze)

2014-09-23 Thread Raphael Hertzog
Hi Emmanuel, On Mon, 22 Sep 2014, Emmanuel Bourg wrote: Glasshfish is an important package for the Java ecosystem as it provides JavaEE specification APIs used to build many other packages. The CVEs reported are most likely related to the complete application server which is almost unused

Bug#762690: libhibernate-validator-java: affected by CVE-2014-3558

2014-09-24 Thread Raphael Hertzog
Package: libhibernate-validator-java Severity: serious Tags: security Hi, the following vulnerability was published for libhibernate-validator-java. CVE-2014-3558[0]: It was discovered that the implementation of org.hibernate.validator.util.ReflectionHelper together with the permissions required

Re: Glassfish security support (in Squeeze)

2014-09-25 Thread Raphael Hertzog
On Thu, 25 Sep 2014, Christoph Biedl wrote: Raphael Hertzog wrote... For Squeeze LTS, we can't really remove a single binary package with an update since the update leaves in its own squeeze-lts repository and this would not remove the package in the main squeeze repo. To me

Bug#762690: libhibernate-validator-java: affected by CVE-2014-3558

2014-11-18 Thread Raphael Hertzog
On Sun, 02 Nov 2014 23:38:30 +0100 Emmanuel Bourg ebo...@apache.org wrote: libhibernate-validator-java is only used as a build dependency of libhibernate3-java. No package depends on it at runtime, so the risk of being affected by this vulnerability is rather low, if not zero. Thank you for

Bug#760733: libspring-java: CVE-2014-0225

2014-11-26 Thread Raphael Hertzog
Hello Stephen, On Mon, 08 Sep 2014, Stephen Nelson wrote: For what it's worth, CVE-2014-3578 was assigned to a directory traversal vulnerability in libspring-java ( http://www.pivotal.io/security/cve-2014-3578) Thanks for letting us know about this one. I've had a quick look and it might

squeeze update of axis?

2015-02-18 Thread Raphael Hertzog
Hello dear maintainer(s), the Debian LTS team would like to fix the security issues which are currently open in the Squeeze version of your package: https://security-tracker.debian.org/tracker/CVE-2014-3596 https://security-tracker.debian.org/tracker/CVE-2012-5784 Would you like to take care of

Re: squeeze update of libspring-2.5-java?

2015-03-09 Thread Raphael Hertzog
Hello Emmanuel, On Tue, 24 Feb 2015, Emmanuel Bourg wrote: CVE-2011-3923 seems to be a Struts vulnerability, why is it assigned to Spring? I asked Salvatore Bonaccorso car...@debian.org to review this since he confirmed that assignation a while ago... he double checked and it was a mistake

Bug#780102: About the security issues affecting libjbcrypt-java in Squeeze

2015-03-10 Thread Raphael Hertzog
Hello dear maintainer(s), the Debian LTS team recently reviewed the security issue(s) affecting your package in Squeeze: https://security-tracker.debian.org/tracker/CVE-2015-0886 We decided that we would not prepare a squeeze security update (usually because the security impact is low and that

squeeze update of libspring-2.5-java?

2015-02-24 Thread Raphael Hertzog
[ CC Damien Raude-Morvan draz...@debian.org who handled the last security upload ] Hello dear maintainer(s), the Debian LTS team would like to fix the security issues which are currently open in the Squeeze version of libspring-2.5-java (this source package only exists in squeeze currently):

squeeze update of jruby?

2015-02-24 Thread Raphael Hertzog
Hello dear maintainer(s), the Debian LTS team would like to fix the security issues which are currently open in the Squeeze version of your jruby: https://security-tracker.debian.org/tracker/CVE-2012-5370 https://security-tracker.debian.org/tracker/CVE-2011-4838 Would you like to take care of

security update of commons-httpclient?

2015-02-24 Thread Raphael Hertzog
Hello dear maintainer(s), the Debian LTS team would like to fix the security issues which are currently open in the Squeeze version of your commons-httpclient: https://security-tracker.debian.org/tracker/CVE-2012-6153 It would be nice if you could take care of this update as the package is not

Bug#783233: CVE-2014-8111: mod_jk ignores JkUnmount rules for subtrees of previous JkMount rules

2015-04-24 Thread Raphael Hertzog
Source: libapache-mod-jk Severity: serious Tags: security Hi, the following vulnerability was published for libapache-mod-jk. CVE-2014-8111[0]: | Apache Tomcat Connectors (mod_jk) before 1.2.41 ignores JkUnmount | rules for subtrees of previous JkMount rules, which allows remote | attackers to

Bug#795027: jarwrapper: Does not work when installed in chroot while already active outside the chroot

2015-08-09 Thread Raphael Hertzog
Control: tag -1 + patch On Sun, 09 Aug 2015, Raphaël Hertzog wrote: A patch will follow. Please find attached the suggested patch. Applies on your current git. Cheers, -- Raphaël Hertzog ◈ Debian Developer Support Debian LTS: http://www.freexian.com/services/debian-lts.html Learn to master

Bug#779895: Suggested patch

2015-08-09 Thread Raphael Hertzog
Control: tag -1 + patch Please consider applying the attached patch. -- Raphaël Hertzog ◈ Debian Developer Support Debian LTS: http://www.freexian.com/services/debian-lts.html Learn to master Debian: http://debian-handbook.info/get/ From 60638e0e74c16704c2f27d8357ebed228a3d8175 Mon Sep 17

Bug#802671: CVE-2015-7940 assigned

2015-10-22 Thread Raphael Hertzog
Control: retitle -1 CVE-2015-7940: bouncycastle: ECC private keys can be recovered via invalid curve attack FTR, this issue has been assigned CVE-2015-7940 Cheers, -- Raphaël Hertzog ◈ Debian Developer Support Debian LTS: http://www.freexian.com/services/debian-lts.html Learn to master

Bug#802671: Tentative patches for version 1.44

2015-10-23 Thread Raphael Hertzog
Hello, I have backported the relevant commits to version 1.44 and the result is in the attached patches. The package builds fine but I have not tested it and I'm not sure how to properly test it... if you have suggestions, I'm happy to hear them. I have asked an upstream developer (Peter

Bug#798650: CVE-2015-5262: https calls ignore http.socket.timeout during SSL Handshake

2015-09-28 Thread Raphael Hertzog
Control: tag -1 + security patch (this is not about commons-httpclient but about httpcomponents-client) On Fri, 11 Sep 2015, Guido Günther wrote: > > Note that according to HTTPCLIENT-1478 [1] this was completely fixed in > > the version 4.3.6. So if this is really a security issue the > >

Bug#802671: Tentative patches for version 1.44

2015-12-07 Thread Raphael Hertzog
On Fri, 04 Dec 2015, Markus Koschany wrote: > thanks for your work on this bug. We intend to upload version 1.51 of > bouncycastle to unstable this weekend since we were able to upgrade all > reverse-dependencies except one so far. Are there any new information > regarding the patches for Jessie?

Bug#802671: Tentative patches for version 1.44

2015-12-04 Thread Raphael Hertzog
Hi, On Fri, 04 Dec 2015, Markus Koschany wrote: > thanks for your work on this bug. We intend to upload version 1.51 of > bouncycastle to unstable this weekend since we were able to upgrade all > reverse-dependencies except one so far. Are there any new information > regarding the patches for

Bug#802671: Tentative patches for version 1.44

2015-11-26 Thread Raphael Hertzog
On Fri, 20 Nov 2015, Raphael Hertzog wrote: > On Fri, 23 Oct 2015, Raphael Hertzog wrote: > > I have asked an upstream developer (Peter Dettman) to review it. > > He reviewed them and came up with further suggestions. So there's a third > patch (attached) to apply on top of the

Bug#802671: Tentative patches for version 1.44

2015-11-20 Thread Raphael Hertzog
On Fri, 23 Oct 2015, Raphael Hertzog wrote: > I have asked an upstream developer (Peter Dettman) to review it. He reviewed them and came up with further suggestions. So there's a third patch (attached) to apply on top of the two patches that I already submitted. I sent him the third pa

Wheezy update of lucene-solr?

2017-07-11 Thread Raphael Hertzog
Dear maintainers, The Debian LTS team would like to fix the security issues which are currently open in the Wheezy version of lucene-solr: https://security-tracker.debian.org/tracker/CVE-2017-3163 Would you like to take care of this yourself? I noticed that lucene-solr is seriously out-of-date

Bug#879001: CVE-2017-12197: libpam4j: Account check bypass

2017-10-18 Thread Raphael Hertzog
Source: libpam4j Version: 1.4-2 Severity: grave Tags: security Hi, the following vulnerability was published for libpam4j. CVE-2017-12197[0]: libpam4j: Account check bypass PAM.authentication() does not call pam_acct_mgmt(). As a consequence, the PAM account is not properly verified. Any user

Bug#879002: Should the package be removed?

2017-10-18 Thread Raphael Hertzog
Source: libpam4j Severity: serious Hello, I just came across libpam4j while handlinge CVE-2017-12197 and I noticed that: - the package has not seen an update since 2012 - the package has no reverse dependency in Debian - upstream seems to have disappeared (the current Homepage URL is dead and

Bug#795244: ca-certificates-java.jar - String index out of range: -1

2018-04-12 Thread Raphael Hertzog
Hello, On Wed, 12 Aug 2015, Christian Hammers wrote: > It does not work though: > > # java -Xmx64m -jar > /usr/share/ca-certificates-java/ca-certificates-java.jar -storepass changeit That's because the program expects data on standard input. A list of certificates to add (prefixed with

Bug#894979: ca-certificates-java: SSL error: "the trustAnchors parameter must be non-empty"

2018-04-12 Thread Raphael Hertzog
retitle -1 ca-certificates-java: does not work with OpenJDK 9, applications fail with InvalidAlgorithmParameterException: the trustAnchors parameter must be non-empty severity -1 serious thanks Hello, On Thu, 05 Apr 2018, George B. wrote: > I am getting an error when connecting to HTTPS from