Bug#674448: CVE-2012-2098

2012-07-18 Thread Nico Golde
Hi,
* Miguel Landaeta mig...@miguel.cc [2012-07-18 17:02]:
 On Thu, May 24, 2012 at 08:13:35PM +0200, Moritz Muehlenhoff wrote:
  Please see https://commons.apache.org/compress/security.html
  
  Fixed in 1.4.1. This doesn't warrant a DSA, but you could fix
  it through a point update for Squeeze 6.0.6.
 
 I had prepared an upload to fix this issue in stable.
 
 Are you OK with an upload to stable then?

Please notify the release team before.

Cheers
Nico
-- 
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.


pgp8mf84QLRmp.pgp
Description: PGP signature
__
This is the maintainer address of Debian's Java team
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-java-maintainers. 
Please use
debian-j...@lists.debian.org for discussions and questions.

Bug#629852: Oracle Java SE Critical Patch Update Advisory - June 2011

2011-06-08 Thread Nico Golde
Package: openjdk-6-jre, sun-java6-jre
Severity: serious
Tags: security

A new round of java issues:
CVE-2011-0862 CVE-2011-0873 CVE-2011-0815 CVE-2011-0817 CVE-2011-0863 
CVE-2011-0864 CVE-2011-0802
CVE-2011-0814 CVE-2011-0871 CVE-2011-0786 CVE-2011-0788 CVE-2011-0866 
CVE-2011-0868 CVE-2011-0872
CVE-2011-0867 CVE-2011-0869 CVE-2011-0865

Some of the issues seem to be windows specific.

http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.


pgpuOVLCQUVeE.pgp
Description: PGP signature
__
This is the maintainer address of Debian's Java team
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-java-maintainers. 
Please use
debian-j...@lists.debian.org for discussions and questions.

Bug#441205: closed by Marcus Better mar...@better.se (CVE-2007-4724 XSS in cal2.jsp)

2009-08-14 Thread Nico Golde
Hi,
 Message-ID: 4a856bcd.9040...@better.se
 Date: Fri, 14 Aug 2009 15:51:09 +0200
 From: Marcus Better mar...@better.se
 User-Agent: Mozilla-Thunderbird 2.0.0.22 (X11/20090701)
 To: 441205-d...@bugs.debian.org
 Subject: CVE-2007-4724 XSS in cal2.jsp
 
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 Bug not present in Tomcat 6.

so why closing a bug that was assigned for tomcat 5?

Cheers
Nico
-- 
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.


pgpTaEvp3urey.pgp
Description: PGP signature
___
pkg-java-maintainers mailing list
pkg-java-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/pkg-java-maintainers

Bug#441205: closed by Marcus Better mar...@better.se (CVE-2007-4724 XSS in cal2.jsp)

2009-08-14 Thread Nico Golde
Hi,
* Marcus Better mar...@better.se [2009-08-14 18:23]:
 Nico Golde wrote:
  Bug not present in Tomcat 6.
  
  so why closing a bug that was assigned for tomcat 5?
 
 Oh, I didn't read closely enough and thought it had been reassigned to
 tomcat6.
 
 Anyway tomcat5 has been removed from the archive and all remaining bugs
 have been reassigned to tomcat6. So I guess this can remain closed, right?

No please don't the source is still in oldstable.

Cheers
Nico
-- 
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.


pgp9SEIpKMmyp.pgp
Description: PGP signature
___
pkg-java-maintainers mailing list
pkg-java-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/pkg-java-maintainers

Bug#494799: CVE-2008-2938: Directory Traversal Vulnerability

2008-08-12 Thread Nico Golde
merge 494504 494799
thanks

Hi Christophe,
* Christophe Boyanique [EMAIL PROTECTED] [2008-08-12 12:37]:
 Package: tomcat5.5
 Version: 5.5.20-2etch3
 Severity: grave
 Tags: security
 
 Tomcat is affected by a directory traversal vulnerability. The problem
 has been fixed in SVN version:

Please check the existing BTS entries before submitting new 
bugs. No idea how you missed:
#494504 [G|S|] [tomcat5.5] CVE-2008-1232/CVE-2008-2370: XSS and directory 
traversal

Check out 
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494504

Cheers
Nico
-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.



___
pkg-java-maintainers mailing list
pkg-java-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/pkg-java-maintainers


Bug#465645: tomcat5.5: CVE-2007-5333 unauthorized disclosure of information

2008-02-13 Thread Nico Golde
Package: tomcat5.5
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities  Exposures) id was
published for tomcat5.5.

CVE-2007-5333[0]:
| Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0
| through 4.1.36 does not properly handle (1) double quote ()
| characters or (2) %5C (encoded backslash) sequences in a cookie value,
| which might cause sensitive information such as session IDs to be
| leaked to remote attackers and enable session hijacking attacks.  NOTE:
| this issue exists because of an incomplete fix for CVE-2007-3385.

If you fix this vulnerability please also include the CVE id
in your changelog entry.

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5333

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpO2rpT8ojLl.pgp
Description: PGP signature
___
pkg-java-maintainers mailing list
pkg-java-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/pkg-java-maintainers

Bug#459281: severity of 459281 is serious

2008-01-13 Thread Nico Golde
# Automatically generated email from bts, devscripts version 2.10.11
# setting it back to previous severity :)
severity 459281 serious




___
pkg-java-maintainers mailing list
pkg-java-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/pkg-java-maintainers


Bug#459281: severity of 459281 is important

2008-01-12 Thread Nico Golde
# Automatically generated email from bts, devscripts version 2.10.11
# temporary downgrading to let the latest security fix enter testing
severity 459281 important




___
pkg-java-maintainers mailing list
pkg-java-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/pkg-java-maintainers


libstruts1.2-java oldstable update for CVE-2005-3745

2007-12-30 Thread Nico Golde
Hi,
the following CVE (Common Vulnerabilities  Exposures) id was
published for libstruts1.2-java some time ago.

CVE-2005-3745[0]:
| Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and
| possibly other versions allows remote attackers to inject arbitrary
| web script or HTML via the query string, which is not properly quoted
| or filtered when the request handler generates an error message.

Unfortunately the vulnerability described above is not important enough
to get it fixed via regular security update in Debian oldstable. It does
not warrant a DSA.

However it would be nice if this could get fixed via a regular point update[1].
Please contact the release time for this.

This is an automatically generated mail, in case you are already working on an
upgrade this is of course pointless.

You can see the status of this vulnerability on:
http://security-tracker.debian.net/tracker/CVE-2005-3745

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3745
[1] 
http://www.debian.org/doc/developers-reference/ch-pkgs.en.html#s-upload-oldstable

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpWk2nGUCCUe.pgp
Description: PGP signature
___
pkg-java-maintainers mailing list
pkg-java-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/pkg-java-maintainers

Bug#458237: tomcat5.5: CVE-2007-5342 unauthorized modification of data because of too open permissions

2007-12-29 Thread Nico Golde
Package: tomcat5.5
Version: 5.5.20-2
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities  Exposures) id was
published for tomcat5.5.

CVE-2007-5342[0]:
| The default catalina.policy in the JULI logging component in Apache
| Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict
| certain permissions for web applications, which allows attackers to
| modify logging configuration options and overwrite arbitrary files, as
| demonstrated by changing the (1) level, (2) directory, and (3) prefix
| attributes in the org.apache.juli.FileHandler handler.

If you fix this vulnerability please also include the CVE id
in your changelog entry.

A patch can be found on:
http://svn.apache.org/viewvc/tomcat/trunk/conf/catalina.policy?r1=593649r2=606594pathrev=606594view=patch

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5342

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpqrtkAcCfvV.pgp
Description: PGP signature
___
pkg-java-maintainers mailing list
pkg-java-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/pkg-java-maintainers

Bug#456148: Current upstream fix for CVE-2007-6306 introduced regression

2007-12-22 Thread Nico Golde
Hi Varun,
* Varun Hiremath [EMAIL PROTECTED] [2007-12-18 19:02]:
 On Thu, 13 Dec, 2007 at 01:46:58PM +0100, Tomas Hoger wrote:
  This has been brought to our attention:
  
  http://sourceforge.net/tracker/index.php?func=detailaid=1849333group_id=15494atid=115494
  
  Upstream author is looking into the issue and expects to release update
  soon.
 
 The following comment[1] was added by the Upstream author:
 
 | This bug has been fixed in the jfreechart-1.0.x-branch in Subversion,
 | and I'll be releasing version 1.0.9 as soon as possible.  The chances
 | of that happening this week are slim, however.
  
 [1]: 
 https://sourceforge.net/tracker/?func=detailatid=115494aid=1849333group_id=15494
 
 I shall update the package once version 1.0.9 is released.

What about updating the current package with the referenced 
patches which fix this?

Kind regards
Nico
-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpgmeO9qGbMi.pgp
Description: PGP signature
___
pkg-java-maintainers mailing list
pkg-java-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/pkg-java-maintainers

Bug#456148: Intend to NMU

2007-12-22 Thread Nico Golde
Hi,
attached is a patch for an NMU which fixes these issues.
It will be also archived on:
http://people.debian.org/~nion/nmu-diff/libjfreechart-java-1.0.8-1_1.0.8-1.1.patch

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
diff -u libjfreechart-java-1.0.8/debian/changelog libjfreechart-java-1.0.8/debian/changelog
--- libjfreechart-java-1.0.8/debian/changelog
+++ libjfreechart-java-1.0.8/debian/changelog
@@ -1,3 +1,13 @@
+libjfreechart-java (1.0.8-1.1) unstable; urgency=high
+
+  * Non-maintainer upload by security team.
+  * This update fixes the following security issue:
+- Multiple cross-site scripting vulnerabilities in the image map
+  feature allow remote attackers to inject arbitrary web script
+  or HTML via several attributes (CVE-2007-6306; Closes: #456148).
+
+ -- Nico Golde [EMAIL PROTECTED]  Sat, 22 Dec 2007 16:04:32 +0100
+
 libjfreechart-java (1.0.8-1) unstable; urgency=low
 
   * New upstream release.
only in patch2:
unchanged:
--- libjfreechart-java-1.0.8.orig/source/org/jfree/chart/entity/ChartEntity.java
+++ libjfreechart-java-1.0.8/source/org/jfree/chart/entity/ChartEntity.java
@@ -76,6 +76,7 @@
 import java.io.Serializable;
 
 import org.jfree.chart.HashUtilities;
+import org.jfree.chart.imagemap.ImageMapUtilities;
 import org.jfree.chart.imagemap.ToolTipTagFragmentGenerator;
 import org.jfree.chart.imagemap.URLTagFragmentGenerator;
 import org.jfree.io.SerialUtilities;
@@ -316,11 +317,11 @@
 + getShapeCoords() + \);
 if (hasToolTip) {
 tag.append(toolTipTagFragmentGenerator.generateToolTipFragment(
-this.toolTipText));
+ImageMapUtilities.htmlEscape(this.toolTipText)));
 }
 if (hasURL) {
 tag.append(urlTagFragmentGenerator.generateURLFragment(
-this.urlText));
+ImageMapUtilities.htmlEscape(this.urlText)));
 }
 // if there is a tool tip, we expect it to generate the title and
 // alt values, so we only add an empty alt if there is no tooltip
only in patch2:
unchanged:
--- libjfreechart-java-1.0.8.orig/source/org/jfree/chart/imagemap/ImageMapUtilities.java
+++ libjfreechart-java-1.0.8/source/org/jfree/chart/imagemap/ImageMapUtilities.java
@@ -171,7 +171,7 @@
 URLTagFragmentGenerator urlTagFragmentGenerator) {
 
 StringBuffer sb = new StringBuffer();
-sb.append(map id=\ + name + \ name=\ + name + \);
+sb.append(map id=\ + htmlEscape(name) + \ name=\ + htmlEscape(name) + \);
 sb.append(StringUtils.getLineSeparator());
 EntityCollection entities = info.getEntityCollection();
 if (entities != null) {
@@ -191,8 +191,49 @@
 }
 }
 sb.append(/map);
-return sb.toString();
-
-}
+   return sb.toString();
 
+}
+/**
+ * Returns a string that is equivalent to the input string, but with 
+ * special characters converted to HTML escape sequences.
+ * 
+ * @param input  the string to escape (codenull/code not permitted).
+ *
+ * @return A string with characters escaped.
+ * 
+ * @since 1.0.9
+ */
+public static String htmlEscape(String input) {
+if (input == null) {
+throw new IllegalArgumentException(Null 'input' argument.);
+}
+StringBuffer result = new StringBuffer();
+int length = input.length();
+for (int i = 0; i  length; i++) {
+char c = input.charAt(i);
+if (c == '') {
+result.append(amp;);
+}
+else if (c == '\') {
+result.append(quot;);
+}
+else if (c == '') {
+result.append(lt;);
+}
+else if (c == '') {
+result.append(gt;);
+}
+else if (c == '\'') {
+result.append(#39;);
+}
+else if (c == '\\') {
+result.append(#092;);
+}
+else {
+result.append(c);
+}
+}
+return result.toString();
+}
 }


pgpFlTgNsWV0Q.pgp
Description: PGP signature
___
pkg-java-maintainers mailing list
pkg-java-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/pkg-java-maintainers

Bug#456148: Intend to NMU

2007-12-22 Thread Nico Golde
Hi Varun,
* Varun Hiremath [EMAIL PROTECTED] [2007-12-22 19:12]:
 On Sat, 22 Dec, 2007 at 04:29:31PM +0100, Nico Golde wrote:
  Hi,
  attached is a patch for an NMU which fixes these issues.
  It will be also archived on:
  http://people.debian.org/~nion/nmu-diff/libjfreechart-java-1.0.8-1_1.0.8-1.1.patch
 
 These two patches are included in the new upstream release 1.0.8a
 which we already have ready for upload, but it introduces new bugs
 [1].

Oh thanks I missed this in the bug report.

 The bug [1] has been fixed in the jfreechart-1.0.x-branch but
 that branch doesn't seem to include the security fixes, so we can't
 update to that branch also. So, we thought of waiting for the new
 1.0.9 release which should happen any time next week.

Waiting for security releases is considered to be bad if you 
can gather the information for fixing this issue.

 @ Michael, should we release 1.0.8a version?

No please not if it breaks things.

Can you maybe ask upstream for the patch then?
His changes to the branch are in revision 676 but he later 
removed some of them in 683 so I am bit confused about the 
status of this in the branch.

Kind regards
Nico


-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpcSaAA6RnZC.pgp
Description: PGP signature
___
pkg-java-maintainers mailing list
pkg-java-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/pkg-java-maintainers

Bug#448841: CVE-2007-5731 directory traversal vulnerability

2007-11-01 Thread Nico Golde
Package: libslide-webdavclient-java
Version: 2.1+dfsg-1
Severity: important
Tags: security

Hi,
the following CVE (Common Vulnerabilities  Exposures) id was
published for libslide-webdavclient-java.

CVE-2007-5731[0]:
| Absolute path traversal vulnerability in Apache Jakarta Slide 2.1 and
| earlier allows remote authenticated users to read arbitrary files via
| a WebDAV write request that specifies an entity with a SYSTEM tag, a
| related issue to CVE-2007-5461.

If you fix this vulnerability please also include the CVE id
in your changelog entry.

This can only be exploited by authenticated attackers.

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5731

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpkRatvcqEEH.pgp
Description: PGP signature
___
pkg-java-maintainers mailing list
pkg-java-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/pkg-java-maintainers

Bug#448664: CVE-2007-5461 absolute path traversal vulnerability

2007-10-30 Thread Nico Golde
Package: tomcat5.5
Severity: important
Tags: security

Hi,
the following CVE (Common Vulnerabilities  Exposures) id was
published for tomcat5.5.

CVE-2007-5461[0]:
| Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through
| 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14,
| under certain configurations, allows remote authenticated users to
| read arbitrary files via a WebDAV write request that specifies an
| entity with a SYSTEM tag.

If you fix this vulnerability please also include the CVE id
in your changelog entry.

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5461

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgp8ZhTWFSAng.pgp
Description: PGP signature
___
pkg-java-maintainers mailing list
pkg-java-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/pkg-java-maintainers

Bug#445283: CVE-2006-6969 predictable session identifiers

2007-10-04 Thread Nico Golde
Package: jetty
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities  Exposures) id was
published for jetty.

CVE-2006-6969[0]:
| Jetty before 4.2.27, 5.1 before 5.1.12, 6.0 before 6.0.2, and 6.1
| before 6.1.0pre3 generates predictable session identifiers using
| java.util.random, which makes it easier for remote attackers to guess
| a session identifier through brute force attacks, bypass
| authentication requirements, and possibly conduct cross-site request
| forgery attacks.

If you fix this vulnerability please also include the CVE id
in your changelog entry.

This vulnerability has been verified in the Debian versions 
by the upstream.
I am currently waiting to get a patch for this.

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6969

Kind regards
Nico

-- 
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpMMnfOaT1NB.pgp
Description: PGP signature
___
pkg-java-maintainers mailing list
pkg-java-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/pkg-java-maintainers

Bug#441205: CVE-2007-4724 XSS in cal2.jsp

2007-09-07 Thread Nico Golde
Package: tomcat5-webapps
Version: 5.0.30-12
Severity: minor
Tags: security

Hi,
a CVE[0] has been issued against your package.
CVE-2007-4724:
Cross-site request forgery (CSRF) vulnerability in cal2.jsp 
in the calendar examples application in Apache Tomcat 4.1.31 
allows remote attackers to add events as arbitrary users via 
the time and description parameters.

I verified that this isse is present in etch however it is 
fixed in tomcat5.5-webapps in unstable and testing.
Please include the CVE id in the changelog if you fix this 
issue.

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4724

Kind regards
Nico

-- 
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpvR8UpYSf12.pgp
Description: PGP signature
___
pkg-java-maintainers mailing list
pkg-java-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/pkg-java-maintainers