changes_fields:
Architecture: all
Binary: openrefine
Changed-By: Markus Koschany <apo@debian.org>
Changes: |2-
openrefine (3.7.8-1) unstable; urgency=high
.
* New upstream version 3.7.8
- Fix CVE-2024-23833: A jdbc attack vulnerability exists in OpenRefine
where an attacker may construct a JDBC query which may read files on
the host filesystem. (Closes: #1064192)
Thanks to Salvatore Bonaccorso for the report.
Checksums-Sha1:
- name: openrefine_3.7.8-1_all.deb
sha1: 942a8fb2ca33054e9ccae90a6776bdf1f25f5ab7
size: '2007992'
- name: openrefine_3.7.8-1_arm64.buildinfo
sha1: 5d66ff054d20a10f53f5dd3c6eaba40995672f67
size: '18320'
Checksums-Sha256:
- name: openrefine_3.7.8-1_all.deb
sha256: bbca1321960e46df8bf7000513962953d09f5e4c84c5471c891eecb5a709a13b
size: '2007992'
- name: openrefine_3.7.8-1_arm64.buildinfo
sha256: 02aac4d822c4bb72604fc20ee4d67eb9069b73072a769908807d8f4cd83401ee
size: '18320'
Closes: '1064192'
Date: Sat, 06 Apr 2024 21:45:36 +0200
Description: |2-
openrefine - powerful tool for working with messy data
Distribution: sid
Files:
- md5sum: af6bfcfa1d672c230671fca8d1e4db3f
name: openrefine_3.7.8-1_all.deb
priority: optional
section: java
size: '2007992'
- md5sum: f101245ac894ba544146f5c0f7c165cb
name: openrefine_3.7.8-1_arm64.buildinfo
priority: optional
section: java
size: '18320'
Format: '1.8'
Maintainer: Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>
Source: openrefine
Urgency: high
Version: 3.7.8-1
type: dpkg