https://bugzilla.redhat.com/show_bug.cgi?id=1751976
Miro Hrončok <mhroncok(a)redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Depends On| |1736585, 1372118, 1372122,
| |1372125, 1372130, 1404912,
| |1456313, 1471273, 1471275,
| |1471277, 1471279, 1480769,
| |1481780, 1539175, 1590941
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1372118
[Bug 1372118] CVE-2016-6345 RESTEasy: Insufficient use of random values in
RESTEasy async jobs could lead to loss of data confidentiality [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1372122
[Bug 1372122] CVE-2016-6346 RESTEasy: Abuse of GZIPInterceptor in RESTEasy can
lead to denial of service attack [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1372125
[Bug 1372125] CVE-2016-6347 RESTEasy: Use of the default exception handler in
RESTEasy can lead to reflected XSS attack [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1372130
[Bug 1372130] CVE-2016-6348 RESTEasy: Use of JacksonJsonpInterceptor in
RESTEasy can lead to Cross Site Script Inclusion attack [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1404912
[Bug 1404912] CVE-2016-9606 Resteasy: Yaml unmarshalling vulnerable to RCE
[fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1456313
[Bug 1456313] CVE-2016-6346 RESTEasy: Abuse of GZIPInterceptor in RESTEasy can
lead to denial of service attack [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1471273
[Bug 1471273] CVE-2016-6345 RESTEasy: Insufficient use of random values in
RESTEasy async jobs could lead to loss of data confidentiality [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1471275
[Bug 1471275] CVE-2016-6346 RESTEasy: Abuse of GZIPInterceptor in RESTEasy can
lead to denial of service attack [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1471277
[Bug 1471277] CVE-2016-6347 RESTEasy: Use of the default exception handler in
RESTEasy can lead to reflected XSS attack [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1471279
[Bug 1471279] CVE-2016-6348 RESTEasy: Use of JacksonJsonpInterceptor in
RESTEasy can lead to Cross Site Script Inclusion attack [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1480769
[Bug 1480769] CVE-2016-6345 RESTEasy: Insufficient use of random values in
RESTEasy async jobs could lead to loss of data confidentiality [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1481780
[Bug 1481780] CVE-2016-6348 RESTEasy: Use of JacksonJsonpInterceptor in
RESTEasy can lead to Cross Site Script Inclusion attack [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1539175
[Bug 1539175] CVE-2018-1051 resteasy: Unsafe unmarshalling in YamlProvider
allows code execution [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1590941
[Bug 1590941] CVE-2016-6347 RESTEasy: Use of the default exception handler in
RESTEasy can lead to reflected XSS attack [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1736585
[Bug 1736585] resteasy: FTBFS in Fedora rawhide/f31
--
You are receiving this mail because:
You are on the CC list for the bug.