Debian Package Tracker
Register | Log in
Subscribe

resteasy3.0

RESTEasy 3.0 -- Framework for RESTful Web services and Java applications

Choose email to subscribe with

general
  • source: resteasy3.0 (main)
  • version: 3.0.26-3
  • maintainer: Debian Java Maintainers (archive) (DMD)
  • uploaders: Timo Aaltonen [DMD]
  • arch: all
  • std-ver: 4.5.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 3.0.26-1
  • stable: 3.0.26-2
  • testing: 3.0.26-3
  • unstable: 3.0.26-3
versioned links
  • 3.0.26-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.0.26-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.0.26-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libresteasy3.0-java
action needed
A new upstream version is available: 6.0.1 high
A new upstream version 6.0.1 is available, you should consider packaging it.
Created: 2021-10-20 Last update: 2022-05-21 02:06
Failed to analyze the VCS repository. Please troubleshoot and fix the issue. high
vcswatch reports that there is an error with this package's VCS, or the debian/changelog file inside it. Please check the error shown below and try to fix it. You might have to update the VCS URL in the debian/control file to point to the correct repository.

changelog package resteasy does not match source resteasy3.0
Created: 2017-12-03 Last update: 2022-05-15 14:32
4 security issues in sid high

There are 4 open security issues in sid.

4 important issues:
  • CVE-2020-10688: A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.
  • CVE-2020-25633: A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.
  • CVE-2020-25724: A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided. This flaw allows an attacker to gain access to privileged information. The highest threat from this vulnerability is to confidentiality and integrity. Versions before resteasy 2.0.0.Alpha3 are affected.
  • CVE-2021-20293: A reflected Cross-Site Scripting (XSS) flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final, where it did not properly handle URL encoding when calling @javax.ws.rs.PathParam without any @Produces MediaType. This flaw allows an attacker to launch a reflected XSS attack. The highest threat from this vulnerability is to data confidentiality and integrity.
Created: 2021-02-19 Last update: 2021-12-05 06:30
5 security issues in buster high

There are 5 open security issues in buster.

2 important issues:
  • CVE-2020-10688: A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.
  • CVE-2021-20293: A reflected Cross-Site Scripting (XSS) flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final, where it did not properly handle URL encoding when calling @javax.ws.rs.PathParam without any @Produces MediaType. This flaw allows an attacker to launch a reflected XSS attack. The highest threat from this vulnerability is to data confidentiality and integrity.
2 issues left for the package maintainer to handle:
  • CVE-2020-1695: (needs triaging) A flaw was found in all resteasy 3.x.x versions prior to 3.12.0.Final and all resteasy 4.x.x versions prior to 4.6.0.Final, where an improper input validation results in returning an illegal header that integrates into the server's response. This flaw may result in an injection, which leads to unexpected behavior when the HTTP response is constructed.
  • CVE-2020-25724: (needs triaging) A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided. This flaw allows an attacker to gain access to privileged information. The highest threat from this vulnerability is to confidentiality and integrity. Versions before resteasy 2.0.0.Alpha3 are affected.

You can find information about how to handle these issues in the security team's documentation.

1 ignored issue:
  • CVE-2020-25633: A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.
Created: 2021-02-19 Last update: 2021-12-05 06:30
4 security issues in bullseye high

There are 4 open security issues in bullseye.

2 important issues:
  • CVE-2020-10688: A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.
  • CVE-2021-20293: A reflected Cross-Site Scripting (XSS) flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final, where it did not properly handle URL encoding when calling @javax.ws.rs.PathParam without any @Produces MediaType. This flaw allows an attacker to launch a reflected XSS attack. The highest threat from this vulnerability is to data confidentiality and integrity.
1 issue left for the package maintainer to handle:
  • CVE-2020-25724: (needs triaging) A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided. This flaw allows an attacker to gain access to privileged information. The highest threat from this vulnerability is to confidentiality and integrity. Versions before resteasy 2.0.0.Alpha3 are affected.

You can find information about how to handle this issue in the security team's documentation.

1 ignored issue:
  • CVE-2020-25633: A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.
Created: 2021-02-19 Last update: 2021-12-05 06:30
4 security issues in bookworm high

There are 4 open security issues in bookworm.

4 important issues:
  • CVE-2020-10688: A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.
  • CVE-2020-25633: A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.
  • CVE-2020-25724: A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided. This flaw allows an attacker to gain access to privileged information. The highest threat from this vulnerability is to confidentiality and integrity. Versions before resteasy 2.0.0.Alpha3 are affected.
  • CVE-2021-20293: A reflected Cross-Site Scripting (XSS) flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final, where it did not properly handle URL encoding when calling @javax.ws.rs.PathParam without any @Produces MediaType. This flaw allows an attacker to launch a reflected XSS attack. The highest threat from this vulnerability is to data confidentiality and integrity.
Created: 2021-08-15 Last update: 2021-12-05 06:30
lintian reports 26 warnings normal
Lintian reports 26 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2021-01-27 Last update: 2021-10-13 21:34
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.5.1).
Created: 2021-08-18 Last update: 2022-05-11 23:25
news
[rss feed]
  • [2021-10-25] resteasy3.0 3.0.26-3 MIGRATED to testing (Debian testing watch)
  • [2021-10-19] Accepted resteasy3.0 3.0.26-3 (source) into unstable (Timo Aaltonen)
  • [2020-12-21] resteasy3.0 3.0.26-2 MIGRATED to testing (Debian testing watch)
  • [2020-12-16] Accepted resteasy3.0 3.0.26-2 (source) into unstable (Timo Aaltonen)
  • [2018-12-11] resteasy3.0 3.0.26-1 MIGRATED to testing (Debian testing watch)
  • [2018-12-05] Accepted resteasy3.0 3.0.26-1 (source) into unstable (Timo Aaltonen)
  • [2018-12-04] Accepted resteasy3.0 3.0.19-5 (source) into unstable (Timo Aaltonen)
  • [2018-10-17] Accepted resteasy3.0 3.0.19-4 (source) into unstable (Timo Aaltonen)
  • [2017-12-28] resteasy3.0 REMOVED from testing (Debian testing watch)
  • [2017-12-20] resteasy3.0 3.0.19-2 MIGRATED to testing (Debian testing watch)
  • [2017-12-14] Accepted resteasy3.0 3.0.19-2 (source) into unstable (Emmanuel Bourg)
  • [2017-12-12] resteasy3.0 3.0.19-1 MIGRATED to testing (Debian testing watch)
  • [2017-10-20] Accepted resteasy3.0 3.0.19-1 (source all) into unstable, unstable (Timo Aaltonen)
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian (0, 26)
  • buildd: logs, clang, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.0.26-3

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing