[Bug 1153842] New: CVE-2014-8760 ejabberd: clients can unexpectedly connect without encryption [epel-6]
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1153842
Bug ID: 1153842
Summary: CVE-2014-8760 ejabberd: clients can unexpectedly
connect without encryption [epel-6]
Product: Fedora EPEL
Version: el6
Component: ejabberd
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: extras-orphan(a)fedoraproject.org
Reporter: mmcallis(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: erlang(a)lists.fedoraproject.org,
extras-orphan(a)fedoraproject.org, jkaluza(a)redhat.com,
martin(a)laptop.org, mmahut(a)redhat.com
Blocks: 1153839 (CVE-2014-8760)
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora EPEL.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
epel-6 tracking bug for ejabberd: see blocks bug list for full details of the
security issue(s).
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1153839
[Bug 1153839] CVE-2014-8760 ejabberd: clients can unexpectedly connect
without encryption
--
You are receiving this mail because:
You are on the CC list for the bug.
8 years, 10 months
[Bug 1154288] New: The package is missing
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1154288
Bug ID: 1154288
Summary: The package is missing
Product: Fedora EPEL
Version: epel7
Component: ejabberd
Assignee: extras-orphan(a)fedoraproject.org
Reporter: frank-buettner(a)gmx.net
QA Contact: extras-qa(a)fedoraproject.org
CC: erlang(a)lists.fedoraproject.org,
extras-orphan(a)fedoraproject.org, jkaluza(a)redhat.com,
martin(a)laptop.org, mmahut(a)redhat.com
It still exits in EL6 but missing for EL7.
Erlang 16 is an part of EL7 so I think ejabberd 14.07 shut possible.
--
You are receiving this mail because:
You are on the CC list for the bug.
8 years, 10 months
[Bug 1153841] New: CVE-2014-8760 ejabberd: clients can unexpectedly connect without encryption [epel-5]
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1153841
Bug ID: 1153841
Summary: CVE-2014-8760 ejabberd: clients can unexpectedly
connect without encryption [epel-5]
Product: Fedora EPEL
Version: el5
Component: ejabberd
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: extras-orphan(a)fedoraproject.org
Reporter: mmcallis(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: erlang(a)lists.fedoraproject.org,
extras-orphan(a)fedoraproject.org, jkaluza(a)redhat.com,
martin(a)laptop.org, mmahut(a)redhat.com
Blocks: 1153839 (CVE-2014-8760)
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora EPEL.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
epel-5 tracking bug for ejabberd: see blocks bug list for full details of the
security issue(s).
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1153839
[Bug 1153839] CVE-2014-8760 ejabberd: clients can unexpectedly connect
without encryption
--
You are receiving this mail because:
You are on the CC list for the bug.
8 years, 10 months
[Bug 1154320] New: remove support for SSLv3
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1154320
Bug ID: 1154320
Summary: remove support for SSLv3
Product: Fedora EPEL
Version: el6
Component: ejabberd
Severity: urgent
Assignee: extras-orphan(a)fedoraproject.org
Reporter: frank-buettner(a)gmx.net
QA Contact: extras-qa(a)fedoraproject.org
CC: erlang(a)lists.fedoraproject.org,
extras-orphan(a)fedoraproject.org, jkaluza(a)redhat.com,
martin(a)laptop.org, mmahut(a)redhat.com
Description of problem:
Version-Release number of selected component (if applicable):
2.1.13
How reproducible:
check the server from https://xmpp.net
Steps to Reproduce:
1. Enter den jabber domain
2. run the test
Actual results:
SSLv3 is supportet
Expected results:
SSLv3 is not used.
--
You are receiving this mail because:
You are on the CC list for the bug.
8 years, 10 months
[Bug 1082171] New: CVE-2014-2668 couchdb: remote denial of service flaw [epel-all]
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1082171
Bug ID: 1082171
Summary: CVE-2014-2668 couchdb: remote denial of service flaw
[epel-all]
Product: Fedora EPEL
Version: el6
Component: couchdb
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: extras-orphan(a)fedoraproject.org
Reporter: vdanen(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: erlang(a)lists.fedoraproject.org,
extras-orphan(a)fedoraproject.org
Blocks: 1082168 (CVE-2014-2668)
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora EPEL.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When creating a Bodhi update request, please use the bodhi submission link
noted in the next comment(s). This will include the bug IDs of this
tracking bug as well as the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
Bodhi notes field when available.
Please note: this issue affects multiple supported versions of Fedora EPEL.
Only one tracking bug has been filed; please ensure that it is only closed
when all affected versions are fixed.
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1082168
[Bug 1082168] CVE-2014-2668 couchdb: remote denial of service flaw
--
You are receiving this mail because:
You are on the CC list for the bug.
8 years, 10 months
[Bug 1059335] New: CVE-2014-1693 erlang: erlang-inets: command injection flaw in FTP module [epel-all]
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1059335
Bug ID: 1059335
Summary: CVE-2014-1693 erlang: erlang-inets: command injection
flaw in FTP module [epel-all]
Product: Fedora EPEL
Version: el6
Component: erlang
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: rjones(a)redhat.com
Reporter: mprpic(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: erlang(a)lists.fedoraproject.org, gemi(a)bluewin.ch,
rjones(a)redhat.com, skottler(a)redhat.com
Blocks: 1059331 (CVE-2014-1693)
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora EPEL.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When creating a Bodhi update request, please use the bodhi submission link
noted in the next comment(s). This will include the bug IDs of this
tracking bug as well as the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
Bodhi notes field when available.
Please note: this issue affects multiple supported versions of Fedora EPEL.
Only one tracking bug has been filed; please ensure that it is only closed
when all affected versions are fixed.
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1059331
[Bug 1059331] CVE-2014-1693 erlang-inets: command injection flaw in FTP
module
--
You are receiving this mail because:
You are on the CC list for the bug.
8 years, 11 months
[Bug 1089475] New: Failed at step EXEC spawning /usr/sbin/ejabberdctl: No such file or directory
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1089475
Bug ID: 1089475
Summary: Failed at step EXEC spawning /usr/sbin/ejabberdctl: No
such file or directory
Product: Fedora
Version: 20
Component: ejabberd
Severity: medium
Assignee: lemenkov(a)gmail.com
Reporter: arcfi(a)aetera.net
QA Contact: extras-qa(a)fedoraproject.org
CC: erlang(a)lists.fedoraproject.org, jkaluza(a)redhat.com,
lemenkov(a)gmail.com, martin(a)laptop.org
Description of problem:
Wrong path to ejabberdctl:
/usr/lib/systemd/system/ejabberd.service
ExecStop=/usr/sbin/ejabberdctl
Version-Release number of selected component (if applicable):
ejabberd-2.1.13-7.fc20.x86_64
How reproducible:
Always.
Steps to Reproduce:
1. systemctl restart ejabberd.service
2. journalctl -lu ejabberd.service
Actual results:
Errors while stopping/restarting service.
Expected results:
Correct path: /usr/bin/ejabberdctl
--
You are receiving this mail because:
You are on the CC list for the bug.
8 years, 11 months