Debian Package Tracker
Register | Log in
Subscribe

commons-text

Apache Commons Text

Choose email to subscribe with

general
  • source: commons-text (main)
  • version: 1.10.0-1
  • maintainer: Debian Java Maintainers (archive) (DMD)
  • uploaders: Andrius Merkys [DMD]
  • arch: all
  • std-ver: 4.6.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • stable: 1.9-1
  • testing: 1.10.0-1
  • unstable: 1.10.0-1
versioned links
  • 1.9-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.10.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libcommons-text-java
action needed
lintian reports 1 warning normal
Lintian reports 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2022-10-16 Last update: 2022-10-16 13:31
1 low-priority security issue in bullseye low

There is 1 open security issue in bullseye.

1 issue left for the package maintainer to handle:
  • CVE-2022-42889: (needs triaging) Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.

You can find information about how to handle this issue in the security team's documentation.

Created: 2022-10-14 Last update: 2023-03-27 11:06
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.2 instead of 4.6.1).
Created: 2022-12-17 Last update: 2022-12-17 19:18
news
[rss feed]
  • [2022-10-21] commons-text 1.10.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-10-15] Accepted commons-text 1.10.0-1 (source) into unstable (tony mancill)
  • [2021-10-29] commons-text 1.9-2 MIGRATED to testing (Debian testing watch)
  • [2021-10-24] Accepted commons-text 1.9-2 (source) into unstable (Andrius Merkys)
  • [2020-08-02] commons-text 1.9-1 MIGRATED to testing (Debian testing watch)
  • [2020-07-27] Accepted commons-text 1.9-1 (source) into unstable (Andrius Merkys)
  • [2019-11-09] commons-text 1.8-2 MIGRATED to testing (Debian testing watch)
  • [2019-11-04] Accepted commons-text 1.8-2 (source) into unstable (Andrius Merkys)
  • [2019-10-30] Accepted commons-text 1.8-1 (source all) into unstable, unstable (Andrius Merkys)
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian (0, 1)
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.10.0-1

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing