Debian Package Tracker
Register | Log in
Subscribe

resteasy

RESTEasy -- Framework for RESTful Web services and Java applications

Choose email to subscribe with

general
  • source: resteasy (main)
  • version: 3.6.2-3
  • maintainer: Debian Java Maintainers (archive) (DMD)
  • uploaders: Timo Aaltonen [DMD]
  • arch: all
  • std-ver: 4.7.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • unstable: 3.6.2-3
versioned links
  • 3.6.2-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libresteasy-java
action needed
A new upstream version is available: 6.2.11 high
A new upstream version 6.2.11 is available, you should consider packaging it.
Created: 2023-09-18 Last update: 2025-05-15 05:00
4 security issues in sid high

There are 4 open security issues in sid.

4 important issues:
  • CVE-2020-1695: A flaw was found in all resteasy 3.x.x versions prior to 3.12.0.Final and all resteasy 4.x.x versions prior to 4.6.0.Final, where an improper input validation results in returning an illegal header that integrates into the server's response. This flaw may result in an injection, which leads to unexpected behavior when the HTTP response is constructed.
  • CVE-2023-0482: In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.
  • CVE-2020-10688: A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.
  • CVE-2020-25633: A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.
Created: 2022-07-04 Last update: 2025-02-27 05:02
4 security issues in trixie high

There are 4 open security issues in trixie.

4 important issues:
  • CVE-2020-1695: A flaw was found in all resteasy 3.x.x versions prior to 3.12.0.Final and all resteasy 4.x.x versions prior to 4.6.0.Final, where an improper input validation results in returning an illegal header that integrates into the server's response. This flaw may result in an injection, which leads to unexpected behavior when the HTTP response is constructed.
  • CVE-2023-0482: In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.
  • CVE-2020-10688: A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.
  • CVE-2020-25633: A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.
Created: 2023-10-22 Last update: 2023-10-22 12:54
The package has not entered testing even though the delay is over normal
The package has not entered testing even though the 10-day delay is over. Check why.
Created: 2024-12-14 Last update: 2025-05-15 07:29
debian/patches: 1 patch to forward upstream low

Among the 2 debian patches available in version 3.6.2-3 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2024-12-09 22:34
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.7.0).
Created: 2025-02-21 Last update: 2025-02-27 13:24
testing migrations
  • excuses:
    • Migration status for resteasy (- to 3.6.2-3): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ Updating resteasy would introduce bugs in testing: #879469
    • ∙ ∙ blocked by freeze: is not in testing
    • Additional info:
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/r/resteasy.html
    • ∙ ∙ Reproducible on amd64 - info ♻
    • ∙ ∙ Reproducible on arm64 - info ♻
    • ∙ ∙ Reproducible on armhf - info ♻
    • ∙ ∙ Reproducible on i386 - info ♻
    • ∙ ∙ 157 days old (needed 10 days)
    • Not considered
news
[rss feed]
  • [2024-12-09] Accepted resteasy 3.6.2-3 (source) into unstable (Emmanuel Bourg)
  • [2019-01-02] Accepted resteasy 3.6.2-2 (source) into unstable (Emmanuel Bourg)
  • [2018-12-04] Accepted resteasy 3.6.2-1 (source) into unstable (Timo Aaltonen)
  • [2018-02-22] resteasy REMOVED from testing (Debian testing watch)
  • [2017-11-27] resteasy 3.1.4-1 MIGRATED to testing (Debian testing watch)
  • [2017-11-21] Accepted resteasy 3.1.4-1 (source) into unstable (Emmanuel Bourg)
  • [2017-06-20] resteasy 3.1.0-2 MIGRATED to testing (Debian testing watch)
  • [2017-05-29] resteasy REMOVED from testing (Debian testing watch)
  • [2017-02-14] Accepted resteasy 3.1.0-2 (source) into unstable (Timo Aaltonen)
  • [2017-01-28] resteasy 3.1.0-1 MIGRATED to testing (Debian testing watch)
  • [2017-01-18] Accepted resteasy 3.1.0-1 (source all) into unstable (Emmanuel Bourg)
  • [2017-01-10] Accepted resteasy 3.0.19-3 (source all) into unstable (Emmanuel Bourg)
  • [2016-10-07] resteasy 3.0.19-2 MIGRATED to testing (Debian testing watch)
  • [2016-10-01] Accepted resteasy 3.0.19-2 (source all) into unstable (Emmanuel Bourg)
  • [2016-09-15] resteasy 3.0.19-1 MIGRATED to testing (Debian testing watch)
  • [2016-09-09] Accepted resteasy 3.0.19-1 (source all) into unstable (Emmanuel Bourg)
  • [2016-07-26] resteasy 3.0.18-1 MIGRATED to testing (Debian testing watch)
  • [2016-07-20] Accepted resteasy 3.0.18-1 (source all) into unstable (Emmanuel Bourg)
  • [2016-04-22] resteasy 3.0.12-1 MIGRATED to testing (Debian testing watch)
  • [2016-04-16] Accepted resteasy 3.0.12-1 (source all) into unstable (Emmanuel Bourg)
  • [2015-08-06] resteasy 3.0.6-3 MIGRATED to testing (Britney)
  • [2015-07-31] Accepted resteasy 3.0.6-3 (source all) into unstable (Emmanuel Bourg)
  • [2014-11-27] resteasy 3.0.6-2 MIGRATED to testing (Britney)
  • [2014-11-24] Accepted resteasy 3.0.6-2 (source all) into unstable (Emmanuel Bourg)
  • [2014-10-28] resteasy 3.0.6-1 MIGRATED to testing (Britney)
  • [2014-10-17] Accepted resteasy 3.0.6-1 (source all) into unstable (Timo Aaltonen)
  • [2014-09-25] Accepted resteasy 3.0.1-1 (source all) into unstable, unstable (Timo Aaltonen)
bugs [bug history graph]
  • all: 5
  • RC: 1
  • I&N: 4
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.6.2-3

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing