Processed: unarchiving 991408, tagging 991408

2023-02-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > unarchive 991408 Bug #991408 {Done: Markus Koschany } [netbeans] netbeans: please remove this package Unarchived Bug 991408 > tags 991408 - stretch-ignore Bug #991408 {Done: Markus Koschany } [netbeans] netbeans: please remove this package

Bug#1031733: libcommons-fileupload-java: CVE-2023-24998

2023-02-21 Thread tony mancill
On Tue, Feb 21, 2023 at 04:10:16PM +0100, Moritz Mühlenhoff wrote: > Source: libcommons-fileupload-java > X-Debbugs-CC: t...@security.debian.org > Severity: important > Tags: security > > Hi, > > The following vulnerability was published for libcommons-fileupload-java. > > CVE-2023-24998[0]: >

jackson-modules-java8_2.14.2+ds2-2_source.changes ACCEPTED into unstable

2023-02-21 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Tue, 21 Feb 2023 23:38:25 -0500 Source: jackson-modules-java8 Architecture: source Version: 2.14.2+ds2-2 Distribution: unstable Urgency: medium Maintainer: Debian Java

Processing of jackson-modules-java8_2.14.2+ds2-2_source.changes

2023-02-21 Thread Debian FTP Masters
jackson-modules-java8_2.14.2+ds2-2_source.changes uploaded successfully to localhost along with the files: jackson-modules-java8_2.14.2+ds2-2.dsc jackson-modules-java8_2.14.2+ds2-2.debian.tar.xz jackson-modules-java8_2.14.2+ds2-2_amd64.buildinfo Greetings, Your Debian queue daemon

Processed: your mail

2023-02-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > archive 991408 Bug #991408 {Done: Markus Koschany } [netbeans] netbeans: please remove this package archived 991408 to archive/08 (from 991408) > End of message, stopping processing here. Please contact me if you need assistance. -- 991408:

Processed (with 1 error): your mail

2023-02-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > retitle #991408 netbeans: please remove this package Bug #991408 {Done: Markus Koschany } [netbeans] Netbeans: source code problem Changed Bug title to 'netbeans: please remove this package' from 'Netbeans: source code problem'. > tags #991408

Processed: found 1031733 in 1.4-1

2023-02-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > found 1031733 1.4-1 Bug #1031733 [src:libcommons-fileupload-java] libcommons-fileupload-java: CVE-2023-24998 Marked as found in versions libcommons-fileupload-java/1.4-1. > thanks Stopping processing here. Please contact me if you need

Processed: tagging 1031728, bug 1031728 is forwarded to https://github.com/resteasy/resteasy/pull/3409/ ...

2023-02-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 1031728 + upstream Bug #1031728 [src:resteasy] resteasy: CVE-2023-0482 Added tag(s) upstream. > forwarded 1031728 https://github.com/resteasy/resteasy/pull/3409/ Bug #1031728 [src:resteasy] resteasy: CVE-2023-0482 Set Bug

Bug#1031733: libcommons-fileupload-java: CVE-2023-24998

2023-02-21 Thread Moritz Mühlenhoff
Source: libcommons-fileupload-java X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for libcommons-fileupload-java. CVE-2023-24998[0]: | Apache Commons FileUpload before 1.5 does not limit the number of | request parts to be

Bug#1031729: resteasy3.0: CVE-2023-0482

2023-02-21 Thread Moritz Mühlenhoff
Source: resteasy3.0 X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for resteasy3.0. CVE-2023-0482[0]: | In RESTEasy the insecure File.createTempFile() is used in the | DataSourceProvider, FileProvider and Mime4JWorkaround

Bug#1031728: resteasy: CVE-2023-0482

2023-02-21 Thread Moritz Mühlenhoff
Source: resteasy X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for resteasy. CVE-2023-0482[0]: | In RESTEasy the insecure File.createTempFile() is used in the | DataSourceProvider, FileProvider and Mime4JWorkaround

Bug#956804:

2023-02-21 Thread Valerio Bozzolan
I just want to mention that, I don't see ANY way at all to expose any custom environment variable to the Tomcat process itself. Feature? Unsure. AFAIK If you push an environment variable inside your catalina.sh, (for example via the previously mentioned setenv.sh), that variable just die in

Bug#956804:

2023-02-21 Thread Valerio Bozzolan
Reading this discussion, I see that at the moment there is not any official way to declare and expose an environment variable to "catalina.sh". I mean, for example, if you need to define this env: (note, it's not a system property): MY_CUSTOM_APPLICATION_SECRET=123 In short, this is the current