https://bugzilla.redhat.com/show_bug.cgi?id=1153842
Bug ID: 1153842
Summary: CVE-2014-8760 ejabberd: clients can unexpectedly
connect without encryption [epel-6]
Product: Fedora EPEL
Version: el6
Component: ejabberd
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: extras-orphan(a)fedoraproject.org
Reporter: mmcallis(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: erlang(a)lists.fedoraproject.org,
extras-orphan(a)fedoraproject.org, jkaluza(a)redhat.com,
martin(a)laptop.org, mmahut(a)redhat.com
Blocks: 1153839 (CVE-2014-8760)
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora EPEL.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
epel-6 tracking bug for ejabberd: see blocks bug list for full details of the
security issue(s).
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1153839
[Bug 1153839] CVE-2014-8760 ejabberd: clients can unexpectedly connect
without encryption
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1154288
Bug ID: 1154288
Summary: The package is missing
Product: Fedora EPEL
Version: epel7
Component: ejabberd
Assignee: extras-orphan(a)fedoraproject.org
Reporter: frank-buettner(a)gmx.net
QA Contact: extras-qa(a)fedoraproject.org
CC: erlang(a)lists.fedoraproject.org,
extras-orphan(a)fedoraproject.org, jkaluza(a)redhat.com,
martin(a)laptop.org, mmahut(a)redhat.com
It still exits in EL6 but missing for EL7.
Erlang 16 is an part of EL7 so I think ejabberd 14.07 shut possible.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1153841
Bug ID: 1153841
Summary: CVE-2014-8760 ejabberd: clients can unexpectedly
connect without encryption [epel-5]
Product: Fedora EPEL
Version: el5
Component: ejabberd
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: extras-orphan(a)fedoraproject.org
Reporter: mmcallis(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: erlang(a)lists.fedoraproject.org,
extras-orphan(a)fedoraproject.org, jkaluza(a)redhat.com,
martin(a)laptop.org, mmahut(a)redhat.com
Blocks: 1153839 (CVE-2014-8760)
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora EPEL.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
epel-5 tracking bug for ejabberd: see blocks bug list for full details of the
security issue(s).
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1153839
[Bug 1153839] CVE-2014-8760 ejabberd: clients can unexpectedly connect
without encryption
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1154320
Bug ID: 1154320
Summary: remove support for SSLv3
Product: Fedora EPEL
Version: el6
Component: ejabberd
Severity: urgent
Assignee: extras-orphan(a)fedoraproject.org
Reporter: frank-buettner(a)gmx.net
QA Contact: extras-qa(a)fedoraproject.org
CC: erlang(a)lists.fedoraproject.org,
extras-orphan(a)fedoraproject.org, jkaluza(a)redhat.com,
martin(a)laptop.org, mmahut(a)redhat.com
Description of problem:
Version-Release number of selected component (if applicable):
2.1.13
How reproducible:
check the server from https://xmpp.net
Steps to Reproduce:
1. Enter den jabber domain
2. run the test
Actual results:
SSLv3 is supportet
Expected results:
SSLv3 is not used.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1082171
Bug ID: 1082171
Summary: CVE-2014-2668 couchdb: remote denial of service flaw
[epel-all]
Product: Fedora EPEL
Version: el6
Component: couchdb
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: extras-orphan(a)fedoraproject.org
Reporter: vdanen(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: erlang(a)lists.fedoraproject.org,
extras-orphan(a)fedoraproject.org
Blocks: 1082168 (CVE-2014-2668)
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora EPEL.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When creating a Bodhi update request, please use the bodhi submission link
noted in the next comment(s). This will include the bug IDs of this
tracking bug as well as the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
Bodhi notes field when available.
Please note: this issue affects multiple supported versions of Fedora EPEL.
Only one tracking bug has been filed; please ensure that it is only closed
when all affected versions are fixed.
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1082168
[Bug 1082168] CVE-2014-2668 couchdb: remote denial of service flaw
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1059335
Bug ID: 1059335
Summary: CVE-2014-1693 erlang: erlang-inets: command injection
flaw in FTP module [epel-all]
Product: Fedora EPEL
Version: el6
Component: erlang
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: rjones(a)redhat.com
Reporter: mprpic(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: erlang(a)lists.fedoraproject.org, gemi(a)bluewin.ch,
rjones(a)redhat.com, skottler(a)redhat.com
Blocks: 1059331 (CVE-2014-1693)
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora EPEL.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When creating a Bodhi update request, please use the bodhi submission link
noted in the next comment(s). This will include the bug IDs of this
tracking bug as well as the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
Bodhi notes field when available.
Please note: this issue affects multiple supported versions of Fedora EPEL.
Only one tracking bug has been filed; please ensure that it is only closed
when all affected versions are fixed.
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1059331
[Bug 1059331] CVE-2014-1693 erlang-inets: command injection flaw in FTP
module
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1089475
Bug ID: 1089475
Summary: Failed at step EXEC spawning /usr/sbin/ejabberdctl: No
such file or directory
Product: Fedora
Version: 20
Component: ejabberd
Severity: medium
Assignee: lemenkov(a)gmail.com
Reporter: arcfi(a)aetera.net
QA Contact: extras-qa(a)fedoraproject.org
CC: erlang(a)lists.fedoraproject.org, jkaluza(a)redhat.com,
lemenkov(a)gmail.com, martin(a)laptop.org
Description of problem:
Wrong path to ejabberdctl:
/usr/lib/systemd/system/ejabberd.service
ExecStop=/usr/sbin/ejabberdctl
Version-Release number of selected component (if applicable):
ejabberd-2.1.13-7.fc20.x86_64
How reproducible:
Always.
Steps to Reproduce:
1. systemctl restart ejabberd.service
2. journalctl -lu ejabberd.service
Actual results:
Errors while stopping/restarting service.
Expected results:
Correct path: /usr/bin/ejabberdctl
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1155472
Bug ID: 1155472
Summary: elixir-1.0.2 is available
Product: Fedora
Version: rawhide
Component: elixir
Keywords: FutureFeature, Triaged
Assignee: relrod(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: erlang(a)lists.fedoraproject.org,
jochen(a)herr-schmitt.de, lemenkov(a)gmail.com,
puiterwijk(a)redhat.com, relrod(a)redhat.com
Latest upstream release: 1.0.2
Current version/release in Fedora Rawhide: 1.0.1-2.fc22
URL: https://api.github.com/repos/elixir-lang/elixir/tags
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring Soon this service
will be implemented by a new system: https://github.com/fedora-infra/anitya/
It will require to manage monitored projects via a new web interface. Please
make yourself familiar with the new system to ease the transition.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1096606
Bug ID: 1096606
Summary: elixir-0.13.2 is available
Product: Fedora
Version: rawhide
Component: elixir
Keywords: FutureFeature, Triaged
Assignee: relrod(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: erlang(a)lists.fedoraproject.org, lemenkov(a)gmail.com,
puiterwijk(a)redhat.com, relrod(a)redhat.com
Latest upstream release: 0.13.2
Current version/release in Fedora Rawhide: 0.12.5-1.fc21
URL: https://api.github.com/repos/elixir-lang/elixir/tags
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
--
You are receiving this mail because:
You are on the CC list for the bug.