Bug#852342: java-package: make-jpkg strips binaries and breaks the work of Ops tools

2017-01-23 Thread Nobuhiro Ban
Package: java-package Version: 0.55 Severity: important In jessie (or later), you got stripped binary files with make-jpkg. Stripping java binary breaks the work of Ops tools. For example, you got an error to use the jmap command to dump heap. I think this is a recurrence of #291238 (fixed in

Bug#763899: jenkins: multiple security vulnerabilities

2014-10-03 Thread Nobuhiro Ban
Package: jenkins Version: 1.565.2-2 Severity: grave Tags: security Dear Maintainer, The upstream vendor announced a security advisory. In this advisory, some vulnerabilities are rated critical severity. https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01

Bug#745897: closed by Hideki Yamane henr...@debian.org (Bug#745897: fixed in libstruts1.2-java 1.2.9-9)

2014-07-21 Thread Nobuhiro Ban
Hi all, 2014-06-16 20:27 GMT+09:00 Emmanuel Bourg ebo...@apache.org: I got confirmation from the Struts developers that a new release using commons-beanutils 1.9.2 is planned soon. So I'm going to prepare the backport of commons-beanutils 1.9.2 in stable and wait for the new release of Struts

Bug#745897: fixed in libstruts1.2-java 1.2.9-9

2014-06-21 Thread Nobuhiro Ban
2014-06-15 15:35 GMT+09:00 Hideki Yamane henr...@debian.or.jp: This pattern will match to words other than class, eg. fooClass. Any class should be accepted, maybe it'd cause some trouble but non-class should not named as *class, IMHO. That might be the case. This issue might be a very small

Bug#745897: closed by Hideki Yamane henr...@debian.org (Bug#745897: fixed in libstruts1.2-java 1.2.9-9)

2014-06-01 Thread Nobuhiro Ban
Hi, - add struts-1.2.9-CVE-2014-0114.patch from Red Hat to fix CVE-2014-0114 http://sources.debian.net/src/libstruts1.2-java/1.2.9-9/debian/patches/struts-1.2.9-CVE-2014-0114.patch +protected static final Pattern CLASS_ACCESS_PATTERN = Pattern +

Bug#745897: closed by Hideki Yamane henr...@debian.org (Bug#745897: fixed in libstruts1.2-java 1.2.9-9)

2014-06-01 Thread Nobuhiro Ban
proofessional, so I can't say that this works perfect, sorry. Regards, Nobuhiro 2014-06-01 15:40 GMT+09:00 Hideki Yamane henr...@debian.or.jp: Hi, On Sun, 1 Jun 2014 15:03:20 +0900 Nobuhiro Ban ban.nobuh...@gmail.com wrote: It's very strange regexp. Because we know (P1|.*|P2) == .* . This pattern

Bug#745897: libstruts1.2-java: CVE-2014-0094 affects Struts 1.x

2014-04-26 Thread Nobuhiro Ban
Package: libstruts1.2-java Version: 1.2.9-8 Severity: grave Tags: security Dear Maintainer, In https://security-tracker.debian.org/tracker/CVE-2014-0094 : Notes - libstruts1.2-java not-affected (Affects Struts 2.0.0 - Struts 2.3.16) But CVE-2014-0094 is known to affect Struts 1.x. Regards,

Bug#739067: jenkins: multiple security vulnerabilities

2014-02-15 Thread Nobuhiro Ban
Package: jenkins Version: 1.509.2+dfsg-2 Severity: grave Tags: security Dear Maintainer, The upstream vendor announced a security advisory. In this advisory, some vulnerabilities are rated high severity. https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14

Bug#731204: jenkins: Watch file does not detect latest version correctly

2013-12-08 Thread Nobuhiro Ban
Hi, I guess Debian adopted Jenkins LTS Release line (x.x.x) [1]. So, it seems unsuitable to watch mainline (x.x). [1] https://wiki.jenkins-ci.org/display/JENKINS/LTS+Release+Line Regards, Nobuhiro __ This is the maintainer address of Debian's Java team

Bug#706725: jenkins: multiple security vulnerabilities

2013-05-03 Thread Nobuhiro Ban
Package: jenkins Version: 1.447.2+dfsg-3, 1.480.3+dfsg-1~exp2 Severity: grave Tags: security Dear Maintainer, The upstream vendor announced a security advisory. In this advisory, one vulnerability is rated critical severity, two are high and one is medium.

Bug#700761: jenkins: multiple security vulnerabilities

2013-02-16 Thread Nobuhiro Ban
Package: jenkins Version: 1.447.2+dfsg-3 Severity: grave Tags: security Dear Maintainer, The upstream vendor announced a security advisory. In this advisory, three vulnerabilities are rated high severity, one is medium and one is low. See:

Bug#697617: jenkins: remote code execution vulnerability

2013-01-07 Thread Nobuhiro Ban
Package: jenkins Version: 1.447.2+dfsg-2 Severity: grave Tags: security Dear Maintainer, The upstream vendor announced a security advisory, that is rated critical severity. See: https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-01-04 Regards, Nobuhiro __ This is

Bug#696816: jenkins: Security issues were found in Jenkins core

2012-12-29 Thread Nobuhiro Ban
clone 696816 -1 reassign -1 jenkins-winstone 0.9.10-jenkins-37+dfsg-1 thanks Dear Maintainer, I found upstream SECURITY-44 (aka CVE-2012-6072) was from Winstone, and it might be fixed in 0.9.10-jenkins-40. https://github.com/jenkinsci/jenkins/commit/ad084edb571555e7c5a9bc5b27aba09aac8da98d