Debian Package Tracker
Register | Log in
Subscribe

jakarta-jmeter

Choose email to subscribe with

general
  • source: jakarta-jmeter (main)
  • version: 2.13-5
  • maintainer: Debian Java Maintainers (archive) (DMD)
  • uploaders: Emmanuel Bourg [DMD] – Onkar Shinde [DMD]
  • arch: all
  • std-ver: 4.6.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.13-2
  • oldstable: 2.13-4
  • stable: 2.13-4
  • testing: 2.13-5
  • unstable: 2.13-5
versioned links
  • 2.13-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.13-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.13-5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • jmeter (2 bugs: 0, 1, 1, 0)
  • jmeter-apidoc
  • jmeter-ftp
  • jmeter-help
  • jmeter-http
  • jmeter-java
  • jmeter-jms
  • jmeter-junit
  • jmeter-ldap
  • jmeter-mail
  • jmeter-mongodb
  • jmeter-tcp
action needed
A new upstream version is available: 5.4.3 high
A new upstream version 5.4.3 is available, you should consider packaging it.
Created: 2020-06-29 Last update: 2022-05-16 14:03
3 security issues in sid high

There are 3 open security issues in sid.

3 important issues:
  • CVE-2018-1287: In Apache JMeter 2.X and 3.X, when using Distributed Test only (RMI based), jmeter server binds RMI Registry to wildcard host. This could allow an attacker to get Access to JMeterEngine and send unauthorized code.
  • CVE-2018-1297: When using Distributed Test only (RMI based), Apache JMeter 2.x and 3.x uses an unsecured RMI connection. This could allow an attacker to get Access to JMeterEngine and send unauthorized code.
  • CVE-2019-0187: Unauthenticated RCE is possible when JMeter is used in distributed mode (-r or -R command line options). Attacker can establish a RMI connection to a jmeter-server using RemoteJMeterEngine and proceed with an attack using untrusted data deserialization. This only affect tests running in Distributed mode. Note that versions before 4.0 are not able to encrypt traffic between the nodes, nor authenticate the participating nodes so upgrade to JMeter 5.1 is also advised.
Created: 2021-02-19 Last update: 2021-12-05 06:30
3 security issues in bookworm high

There are 3 open security issues in bookworm.

3 important issues:
  • CVE-2018-1287: In Apache JMeter 2.X and 3.X, when using Distributed Test only (RMI based), jmeter server binds RMI Registry to wildcard host. This could allow an attacker to get Access to JMeterEngine and send unauthorized code.
  • CVE-2018-1297: When using Distributed Test only (RMI based), Apache JMeter 2.x and 3.x uses an unsecured RMI connection. This could allow an attacker to get Access to JMeterEngine and send unauthorized code.
  • CVE-2019-0187: Unauthenticated RCE is possible when JMeter is used in distributed mode (-r or -R command line options). Attacker can establish a RMI connection to a jmeter-server using RemoteJMeterEngine and proceed with an attack using untrusted data deserialization. This only affect tests running in Distributed mode. Note that versions before 4.0 are not able to encrypt traffic between the nodes, nor authenticate the participating nodes so upgrade to JMeter 5.1 is also advised.
Created: 2021-08-15 Last update: 2021-12-05 06:30
Does not build reproducibly during testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2018-09-11 Last update: 2022-05-16 14:05
lintian reports 13 warnings normal
Lintian reports 13 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2021-10-13 Last update: 2021-10-13 21:32
AppStream hints: 1 warning normal
AppStream found metadata issues for packages:
  • jmeter: 1 warning
You should get rid of them to provide more metadata about this software.
Created: 2020-06-01 Last update: 2020-06-01 01:13
Multiarch hinter reports 2 issue(s) low
There are issues with the multiarch metadata for this package.
  • jmeter-apidoc could be marked Multi-Arch: foreign
  • jmeter-help could be marked Multi-Arch: foreign
Created: 2016-09-14 Last update: 2022-05-16 14:06
3 low-priority security issues in buster low

There are 3 open security issues in buster.

2 issues left for the package maintainer to handle:
  • CVE-2018-1287: (needs triaging) In Apache JMeter 2.X and 3.X, when using Distributed Test only (RMI based), jmeter server binds RMI Registry to wildcard host. This could allow an attacker to get Access to JMeterEngine and send unauthorized code.
  • CVE-2019-0187: (needs triaging) Unauthenticated RCE is possible when JMeter is used in distributed mode (-r or -R command line options). Attacker can establish a RMI connection to a jmeter-server using RemoteJMeterEngine and proceed with an attack using untrusted data deserialization. This only affect tests running in Distributed mode. Note that versions before 4.0 are not able to encrypt traffic between the nodes, nor authenticate the participating nodes so upgrade to JMeter 5.1 is also advised.

You can find information about how to handle these issues in the security team's documentation.

1 ignored issue:
  • CVE-2018-1297: When using Distributed Test only (RMI based), Apache JMeter 2.x and 3.x uses an unsecured RMI connection. This could allow an attacker to get Access to JMeterEngine and send unauthorized code.
Created: 2021-02-19 Last update: 2021-12-05 06:30
3 low-priority security issues in bullseye low

There are 3 open security issues in bullseye.

2 issues left for the package maintainer to handle:
  • CVE-2018-1287: (needs triaging) In Apache JMeter 2.X and 3.X, when using Distributed Test only (RMI based), jmeter server binds RMI Registry to wildcard host. This could allow an attacker to get Access to JMeterEngine and send unauthorized code.
  • CVE-2019-0187: (needs triaging) Unauthenticated RCE is possible when JMeter is used in distributed mode (-r or -R command line options). Attacker can establish a RMI connection to a jmeter-server using RemoteJMeterEngine and proceed with an attack using untrusted data deserialization. This only affect tests running in Distributed mode. Note that versions before 4.0 are not able to encrypt traffic between the nodes, nor authenticate the participating nodes so upgrade to JMeter 5.1 is also advised.

You can find information about how to handle these issues in the security team's documentation.

1 ignored issue:
  • CVE-2018-1297: When using Distributed Test only (RMI based), Apache JMeter 2.x and 3.x uses an unsecured RMI connection. This could allow an attacker to get Access to JMeterEngine and send unauthorized code.
Created: 2021-08-14 Last update: 2021-12-05 06:30
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.6.0).
Created: 2022-05-11 Last update: 2022-05-11 23:25
news
[rss feed]
  • [2021-09-15] jakarta-jmeter 2.13-5 MIGRATED to testing (Debian testing watch)
  • [2021-09-10] Accepted jakarta-jmeter 2.13-5 (source) into unstable (Markus Koschany)
  • [2018-08-06] jakarta-jmeter 2.13-4 MIGRATED to testing (Debian testing watch)
  • [2018-07-31] Accepted jakarta-jmeter 2.13-4 (source) into unstable (Emmanuel Bourg)
  • [2017-11-08] jakarta-jmeter REMOVED from testing (Debian testing watch)
  • [2017-07-29] jakarta-jmeter 2.13-3 MIGRATED to testing (Debian testing watch)
  • [2017-07-23] Accepted jakarta-jmeter 2.13-3 (source all) into unstable (tony mancill)
  • [2016-11-04] jakarta-jmeter 2.13-2 MIGRATED to testing (Debian testing watch)
  • [2016-10-28] Accepted jakarta-jmeter 2.13-2 (source all) into unstable (Emmanuel Bourg)
  • [2016-06-05] Accepted jakarta-jmeter 2.11-2+deb8u1 (source all) into proposed-updates->stable-new, proposed-updates (Emmanuel Bourg)
  • [2016-05-20] Accepted jakarta-jmeter 2.13-1~bpo8+1 (source all) into jessie-backports, jessie-backports (Emmanuel Bourg)
  • [2016-04-05] jakarta-jmeter 2.13-1 MIGRATED to testing (Debian testing watch)
  • [2016-03-30] Accepted jakarta-jmeter 2.13-1 (source all) into unstable (Emmanuel Bourg)
  • [2015-12-12] jakarta-jmeter 2.11-5 MIGRATED to testing (Debian testing watch)
  • [2015-12-06] Accepted jakarta-jmeter 2.11-5 (source all) into unstable (Markus Koschany)
  • [2015-11-03] jakarta-jmeter 2.11-4 MIGRATED to testing (Britney)
  • [2015-10-28] Accepted jakarta-jmeter 2.11-4 (source) into unstable (Markus Koschany)
  • [2015-07-22] jakarta-jmeter 2.11-3 MIGRATED to testing (Britney)
  • [2015-07-16] Accepted jakarta-jmeter 2.11-3 (source all) into unstable (Emmanuel Bourg)
  • [2014-09-24] jakarta-jmeter 2.11-2 MIGRATED to testing (Britney)
  • [2014-09-18] Accepted jakarta-jmeter 2.11-2 (source all) into unstable (Emmanuel Bourg)
  • [2014-07-23] Accepted jakarta-jmeter 2.11-1 (source all) (Emmanuel Bourg) (signed by: tony mancill)
  • [2014-04-22] jakarta-jmeter 2.8-2 MIGRATED to testing (Debian testing watch)
  • [2014-04-11] Accepted jakarta-jmeter 2.8-2 (source all) (Emmanuel Bourg)
  • [2013-07-16] jakarta-jmeter 2.8-1 MIGRATED to testing (Debian testing watch)
  • [2013-07-05] Accepted jakarta-jmeter 2.8-1 (source all) (Emmanuel Bourg)
  • [2013-07-03] Accepted jakarta-jmeter 2.5.1-2 (source all) (Emmanuel Bourg)
  • [2012-05-22] jakarta-jmeter 2.5.1-1 MIGRATED to testing (Debian testing watch)
  • [2012-05-12] Accepted jakarta-jmeter 2.5.1-1 (source all) (Onkar Shinde) (signed by: tony mancill)
  • [2012-05-03] jakarta-jmeter 2.4-3 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 5
  • RC: 0
  • I&N: 3
  • M&W: 2
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 13)
  • buildd: logs, clang, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.13-5
  • 3 bugs (1 patch)

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing