Processing commands for cont...@bugs.debian.org:
> unarchive 991408
Bug #991408 {Done: Markus Koschany } [netbeans] netbeans:
please remove this package
Unarchived Bug 991408
> tags 991408 - stretch-ignore
Bug #991408 {Done: Markus Koschany } [netbeans] netbeans:
please remove this package
On Tue, Feb 21, 2023 at 04:10:16PM +0100, Moritz Mühlenhoff wrote:
> Source: libcommons-fileupload-java
> X-Debbugs-CC: t...@security.debian.org
> Severity: important
> Tags: security
>
> Hi,
>
> The following vulnerability was published for libcommons-fileupload-java.
>
> CVE-2023-24998[0]:
>
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Tue, 21 Feb 2023 23:38:25 -0500
Source: jackson-modules-java8
Architecture: source
Version: 2.14.2+ds2-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Java
jackson-modules-java8_2.14.2+ds2-2_source.changes uploaded successfully to
localhost
along with the files:
jackson-modules-java8_2.14.2+ds2-2.dsc
jackson-modules-java8_2.14.2+ds2-2.debian.tar.xz
jackson-modules-java8_2.14.2+ds2-2_amd64.buildinfo
Greetings,
Your Debian queue daemon
Processing commands for cont...@bugs.debian.org:
> archive 991408
Bug #991408 {Done: Markus Koschany } [netbeans] netbeans:
please remove this package
archived 991408 to archive/08 (from 991408)
>
End of message, stopping processing here.
Please contact me if you need assistance.
--
991408:
Processing commands for cont...@bugs.debian.org:
> retitle #991408 netbeans: please remove this package
Bug #991408 {Done: Markus Koschany } [netbeans] Netbeans:
source code problem
Changed Bug title to 'netbeans: please remove this package' from 'Netbeans:
source code problem'.
> tags #991408
Processing commands for cont...@bugs.debian.org:
> found 1031733 1.4-1
Bug #1031733 [src:libcommons-fileupload-java] libcommons-fileupload-java:
CVE-2023-24998
Marked as found in versions libcommons-fileupload-java/1.4-1.
> thanks
Stopping processing here.
Please contact me if you need
Processing commands for cont...@bugs.debian.org:
> tags 1031728 + upstream
Bug #1031728 [src:resteasy] resteasy: CVE-2023-0482
Added tag(s) upstream.
> forwarded 1031728 https://github.com/resteasy/resteasy/pull/3409/
Bug #1031728 [src:resteasy] resteasy: CVE-2023-0482
Set Bug
Source: libcommons-fileupload-java
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security
Hi,
The following vulnerability was published for libcommons-fileupload-java.
CVE-2023-24998[0]:
| Apache Commons FileUpload before 1.5 does not limit the number of
| request parts to be
Source: resteasy3.0
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security
Hi,
The following vulnerability was published for resteasy3.0.
CVE-2023-0482[0]:
| In RESTEasy the insecure File.createTempFile() is used in the
| DataSourceProvider, FileProvider and Mime4JWorkaround
Source: resteasy
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security
Hi,
The following vulnerability was published for resteasy.
CVE-2023-0482[0]:
| In RESTEasy the insecure File.createTempFile() is used in the
| DataSourceProvider, FileProvider and Mime4JWorkaround
I just want to mention that, I don't see ANY way at all to expose any
custom environment variable to the Tomcat process itself.
Feature? Unsure.
AFAIK If you push an environment variable inside your catalina.sh, (for
example via the previously mentioned setenv.sh), that variable just die
in
Reading this discussion, I see that at the moment there is not any
official way to declare and expose an environment variable to
"catalina.sh".
I mean, for example, if you need to define this env:
(note, it's not a system property):
MY_CUSTOM_APPLICATION_SECRET=123
In short, this is the current
13 matches
Mail list logo