[Bug 1489922] New: Add eclipse-m2e-wtp packages (jaxrs, jpa, jsf)
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1489922
Bug ID: 1489922
Summary: Add eclipse-m2e-wtp packages (jaxrs, jpa, jsf)
Product: Fedora
Version: rawhide
Component: eclipse-m2e-core
Assignee: mizdebsk(a)redhat.com
Reporter: nboldt(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: eclipse-sig(a)lists.fedoraproject.org, gerard(a)ryan.lt,
mizdebsk(a)redhat.com
Description of problem:
We need to add these features and their associated plugins to Fedora for
downstream consumption in rh-eclipse47
org.eclipse.m2e.wtp.feature,
org.eclipse.m2e.wtp.jaxrs.feature,
org.eclipse.m2e.wtp.jpa.feature,
org.eclipse.m2e.wtp.jsf.feature (all version 1.3.3)
http://download.jboss.org/jbosstools/updates/requirements/m2e-wtp/1.3.3.2...
Version-Release number of selected component (if applicable):
1.3.3.20170823-1905 (stable milestone for Oxygen)
--
You are receiving this mail because:
You are on the CC list for the bug.
6 years, 5 months
[Bug 1446900] Conflicting handlers for org.eclipse.ui.window.nextView:
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1446900
--- Comment #1 from Fedora End Of Life <jkurik(a)fedoraproject.org> ---
This message is a reminder that Fedora 25 is nearing its end of life.
Approximately 4 (four) weeks from now Fedora will stop maintaining
and issuing updates for Fedora 25. It is Fedora's policy to close all
bug reports from releases that are no longer maintained. At that time
this bug will be closed as EOL if it remains open with a Fedora 'version'
of '25'.
Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, simply change the 'version'
to a later Fedora version.
Thank you for reporting this issue and we are sorry that we were not
able to fix it before Fedora 25 is end of life. If you would still like
to see this bug fixed and are able to reproduce it against a later version
of Fedora, you are encouraged change the 'version' to a later Fedora
version prior this bug is closed as described in the policy above.
Although we aim to fix as many bugs as possible during every release's
lifetime, sometimes those efforts are overtaken by events. Often a
more recent Fedora release includes newer upstream software that fixes
bugs or makes them obsolete.
--
You are receiving this mail because:
You are on the CC list for the bug.
6 years, 5 months
[Bug 1421374] [abrt] java-1.8.0-openjdk-headless: read_packet(): java killed by SIGABRT
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1421374
--- Comment #14 from Fedora End Of Life <jkurik(a)fedoraproject.org> ---
This message is a reminder that Fedora 25 is nearing its end of life.
Approximately 4 (four) weeks from now Fedora will stop maintaining
and issuing updates for Fedora 25. It is Fedora's policy to close all
bug reports from releases that are no longer maintained. At that time
this bug will be closed as EOL if it remains open with a Fedora 'version'
of '25'.
Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, simply change the 'version'
to a later Fedora version.
Thank you for reporting this issue and we are sorry that we were not
able to fix it before Fedora 25 is end of life. If you would still like
to see this bug fixed and are able to reproduce it against a later version
of Fedora, you are encouraged change the 'version' to a later Fedora
version prior this bug is closed as described in the policy above.
Although we aim to fix as many bugs as possible during every release's
lifetime, sometimes those efforts are overtaken by events. Often a
more recent Fedora release includes newer upstream software that fixes
bugs or makes them obsolete.
--
You are receiving this mail because:
You are on the CC list for the bug.
6 years, 5 months
[Bug 1501529] CVE-2017-12629 Solr: Code execution via entity expansion
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1501529
Chess Hazlett <chazlett(a)redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Whiteboard|impact=critical,public=2017 |impact=critical,public=2017
|1012,reported=20171010,sour |1012,reported=20171009,sour
|ce=internet,cvss2=10/AV:N/A |ce=internet,cvss2=10/AV:N/A
|C:L/Au:N/C:C/I:C/A:C,cvss3= |C:L/Au:N/C:C/I:C/A:C,cvss3=
|9.8/CVSS:3.0/AV:N/AC:L/PR:N |9.8/CVSS:3.0/AV:N/AC:L/PR:N
|/UI:N/S:U/C:H/I:H/A:H,eap-6 |/UI:N/S:U/C:H/I:H/A:H,cwe=C
|/solr=notaffected,eap-7/luc |WE-138,eap-6/solr=notaffect
|ene=affected/impact=moderat |ed,eap-7/lucene=affected/im
|e,jpp-6/solr=notaffected/im |pact=moderate,jpp-6/solr=no
|pact=moderate,rhsso-7/lucen |taffected/impact=moderate,r
|e=notaffected/impact=modera |hsso-7/lucene=notaffected/i
|te,jdg-7/lucene=affected/im |mpact=moderate,jdg-7/lucene
|pact=moderate,fuse-6/Camel= |=affected/impact=moderate,f
|notaffected,brms-6/lucene=n |use-6/Camel=notaffected,brm
|otaffected,bpms-6/lucene=no |s-6/lucene=notaffected,bpms
|taffected,rhev-m-4/lucene=n |-6/lucene=notaffected,rhev-
|otaffected/impact=moderate, |m-4/lucene=notaffected/impa
|rhel-5/lucene=notaffected,r |ct=moderate,rhel-5/lucene=n
|hel-6/lucene=wontfix/impact |otaffected,rhel-6/lucene=wo
|=moderate,rhscl-3/rh-java-c |ntfix/impact=moderate,rhscl
|ommon-lucene=affected/impac |-3/rh-java-common-lucene=af
|t=moderate,rhscl-3/rh-java- |fected/impact=moderate,rhsc
|common-lucene5=affected/imp |l-3/rh-java-common-lucene5=
|act=moderate,fedora-all/luc |affected/impact=moderate,fe
|ene=affected,fedora-all/luc |dora-all/lucene=affected,fe
|ene4=affected,fedora-all/lu |dora-all/lucene4=affected,f
|cene3=affected,fedora-all/s |edora-all/lucene3=affected,
|olr3=affected,eap-6/lucene= |fedora-all/solr3=affected,e
|notaffected |ap-6/lucene=notaffected
--
You are receiving this mail because:
You are on the CC list for the bug.
6 years, 5 months
[Bug 1501838] New: CVE-2017-12629 lucene: Solr: Code execution via entity expansion [fedora-all]
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1501838
Bug ID: 1501838
Summary: CVE-2017-12629 lucene: Solr: Code execution via entity
expansion [fedora-all]
Product: Fedora
Version: 26
Component: lucene
Keywords: Security, SecurityTracking
Severity: urgent
Priority: urgent
Assignee: akurtako(a)redhat.com
Reporter: anemec(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: akurtako(a)redhat.com, dchen(a)redhat.com,
eclipse-sig(a)lists.fedoraproject.org,
jerboaa(a)gmail.com, krzysztof.daniel(a)gmail.com,
lef(a)fedoraproject.org, msimacek(a)redhat.com,
rgrunber(a)redhat.com
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of fedora-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
6 years, 5 months
[Bug 1501529] CVE-2017-12629 Solr: Code execution via entity expansion
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1501529
Eric Christensen <sparks(a)redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Whiteboard|impact=critical,public=2017 |impact=critical,public=2017
|1012,reported=20171011,sour |1012,reported=20171010,sour
|ce=internet,cvss2=10/AV:N/A |ce=internet,cvss2=10/AV:N/A
|C:L/Au:N/C:C/I:C/A:C,cvss3= |C:L/Au:N/C:C/I:C/A:C,cvss3=
|9.8/CVSS:3.0/AV:N/AC:L/PR:N |9.8/CVSS:3.0/AV:N/AC:L/PR:N
|/UI:N/S:U/C:H/I:H/A:H,eap-6 |/UI:N/S:U/C:H/I:H/A:H,eap-6
|/solr=notaffected,eap-7/luc |/solr=notaffected,eap-7/luc
|ene=affected/impact=moderat |ene=affected/impact=moderat
|e,jpp-6/solr=notaffected/im |e,jpp-6/solr=notaffected/im
|pact=moderate,rhsso-7/lucen |pact=moderate,rhsso-7/lucen
|e=notaffected/impact=modera |e=notaffected/impact=modera
|te,jdg-7/lucene=affected/im |te,jdg-7/lucene=affected/im
|pact=moderate,fuse-6/Camel= |pact=moderate,fuse-6/Camel=
|notaffected,brms-6/lucene=n |notaffected,brms-6/lucene=n
|otaffected,bpms-6/lucene=no |otaffected,bpms-6/lucene=no
|taffected,rhev-m-4/lucene=n |taffected,rhev-m-4/lucene=n
|otaffected/impact=moderate, |otaffected/impact=moderate,
|rhel-5/lucene=notaffected,r |rhel-5/lucene=notaffected,r
|hel-6/lucene=wontfix/impact |hel-6/lucene=wontfix/impact
|=moderate,rhscl-3/rh-java-c |=moderate,rhscl-3/rh-java-c
|ommon-lucene=affected/impac |ommon-lucene=affected/impac
|t=moderate,rhscl-3/rh-java- |t=moderate,rhscl-3/rh-java-
|common-lucene5=affected/imp |common-lucene5=affected/imp
|act=moderate,fedora-all/luc |act=moderate,fedora-all/luc
|ene=affected,fedora-all/luc |ene=affected,fedora-all/luc
|ene4=affected,fedora-all/lu |ene4=affected,fedora-all/lu
|cene3=affected,fedora-all/s |cene3=affected,fedora-all/s
|olr3=affected,eap-6/lucene= |olr3=affected,eap-6/lucene=
|notaffected |notaffected
--- Doc Text *updated* ---
It was found that Apache Lucene would accept an object from an unauthenticated user that could be manipulated through subsequent post requests. An attacker could use this flaw to assemble an object that could permit execution of arbitrary code if the server enabled Apache Solr's Config API.
--
You are receiving this mail because:
You are on the CC list for the bug.
6 years, 5 months