tomcat7_7.0.62-1_amd64.changes ACCEPTED into unstable

2015-05-27 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 27 May 2015 11:43:31 +0200 Source: tomcat7 Binary: tomcat7-common tomcat7 tomcat7-user libtomcat7-java libservlet3.0-java libservlet3.0-java-doc tomcat7-admin tomcat7-examples tomcat7-docs Architecture: source all

Processing of tomcat7_7.0.62-1_amd64.changes

2015-05-27 Thread Debian FTP Masters
tomcat7_7.0.62-1_amd64.changes uploaded successfully to localhost along with the files: tomcat7_7.0.62-1.dsc tomcat7_7.0.62.orig.tar.xz tomcat7_7.0.62-1.debian.tar.xz tomcat7-common_7.0.62-1_all.deb tomcat7_7.0.62-1_all.deb tomcat7-user_7.0.62-1_all.deb

Bug#787010: tomcat6: CVE-2014-7810: Security Manager bypass by expression language

2015-05-27 Thread Santiago Ruano Rincón
Source: tomcat6 Version: 6.0.41-2+squeeze6 Severity: normal Tags: security patch upstream fixed-upstream Dear Debian Java maintainers, The Tomcat security team has identified a security issue [cve] that allows malicious web applications to bypass the Security Manager, by the use of expression

Processed: found 787010 in 6.0.41-1

2015-05-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: found 787010 6.0.41-1 Bug #787010 [src:tomcat6] tomcat6: CVE-2014-7810: Security Manager bypass by expression language Marked as found in versions tomcat6/6.0.41-1. thanks Stopping processing here. Please contact me if you need assistance. --

Processed: found 787010 in 6.0.35-1, fixed 787010 in 6.0.41-3

2015-05-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: found 787010 6.0.35-1 Bug #787010 [src:tomcat6] tomcat6: CVE-2014-7810: Security Manager bypass by expression language Marked as found in versions tomcat6/6.0.35-1. # some version tracking update for the BTS fixed 787010 6.0.41-3 Bug #787010

libxmpcore-java 5.1.2-3 MIGRATED to testing

2015-05-27 Thread Debian testing watch
FYI: The status of the libxmpcore-java source package in Debian's testing distribution has changed. Previous version: 5.1.2-2 Current version: 5.1.2-3 -- This email is automatically generated once a day. As the installation of new packages into testing happens multiple times a day you

Processed: Re: jruby: has poor cryptographic support

2015-05-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: tags 743746 + confirmed Bug #743746 [jruby] jruby: has poor cryptographic support Added tag(s) confirmed. owner 743746 ! Bug #743746 [jruby] jruby: has poor cryptographic support Owner recorded as Miguel Landaeta nomad...@debian.org. thanks

Bug#743746: jruby: has poor cryptographic support

2015-05-27 Thread Miguel Landaeta
tags 743746 + confirmed owner 743746 ! thanks On Sat, Apr 05, 2014 at 09:52:25PM +, brian m. carlson wrote: Package: jruby Version: 1.5.6-7 Severity: normal JRuby has really bad cryptographic support. First, many algorithms are missing. The output directs me to the jruby-openssl gem,

glassfish 1:2.1.1-b31g+dfsg1-3 MIGRATED to testing

2015-05-27 Thread Debian testing watch
FYI: The status of the glassfish source package in Debian's testing distribution has changed. Previous version: 1:2.1.1-b31g+dfsg1-2 Current version: 1:2.1.1-b31g+dfsg1-3 -- This email is automatically generated once a day. As the installation of new packages into testing happens multiple

libzeus-jscl-java_1.72-1_amd64.changes REJECTED

2015-05-27 Thread Thorsten Alteholz
Hi Andreas, please take care of src/gr/zeus/res/eclipse-icons-license.txt Thanks! Thorsten === Please feel free to respond to this email if you don't understand why your files were rejected, or if you upload new files which address our concerns. __ This is the maintainer address of

japi-compliance-checker 1.4.1-1 MIGRATED to testing

2015-05-27 Thread Debian testing watch
FYI: The status of the japi-compliance-checker source package in Debian's testing distribution has changed. Previous version: 1.3.7-1 Current version: 1.4.1-1 -- This email is automatically generated once a day. As the installation of new packages into testing happens multiple times a day

Processed: your mail

2015-05-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: owner 663342 ! Bug #663342 [jruby] jruby: Please add /usr/lib/ruby/vendor_ruby to the default $LOAD_PATH Owner recorded as Miguel Landaeta nomad...@debian.org. tags 663342 + confirmed pending Bug #663342 [jruby] jruby: Please add

Processing of libzeus-jscl-java_1.72-1_amd64.changes

2015-05-27 Thread Debian FTP Masters
libzeus-jscl-java_1.72-1_amd64.changes uploaded successfully to localhost along with the files: libzeus-jscl-java_1.72-1.dsc libzeus-jscl-java_1.72.orig.tar.xz libzeus-jscl-java_1.72-1.debian.tar.xz libzeus-jscl-java-doc_1.72-1_all.deb libzeus-jscl-java_1.72-1_all.deb Greetings,

Re: libzeus-jscl-java_1.72-1_amd64.changes REJECTED

2015-05-27 Thread Andreas Tille
Done. Thanks for checking Andreas. On Wed, May 27, 2015 at 05:00:13PM +, Thorsten Alteholz wrote: Hi Andreas, please take care of src/gr/zeus/res/eclipse-icons-license.txt Thanks! Thorsten === Please feel free to respond to this email if you don't understand why

Bug#663342: /usr/lib/ruby/vendor_ruby now in $LOAD_PATH

2015-05-27 Thread Potter, Tim (Cloud Services)
It looks like this has been fixed, at least in sid: root@56264f4d8fa9:/Source/pkg-java/jruby# cat /etc/issue Debian GNU/Linux 8 \n \l root@56264f4d8fa9:/Source/pkg-java/jruby# ruby -v ruby 2.1.5p273 (2014-11-13) [x86_64-linux-gnu] root@56264f4d8fa9:/Source/pkg-java/jruby# irb irb(main):001:0

libzeus-jscl-java_1.72-1_amd64.changes is NEW

2015-05-27 Thread Debian FTP Masters
binary:libzeus-jscl-java is NEW. binary:libzeus-jscl-java-doc is NEW. source:libzeus-jscl-java is NEW. Your package has been put into the NEW queue, which requires manual action from the ftpteam to process. The upload was otherwise valid (it had a good OpenPGP signature and file hashes are