[Bug 1276653] New: fop fails to include some images
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1276653
Bug ID: 1276653
Summary: fop fails to include some images
Product: Fedora
Version: 23
Component: fop
Severity: high
Assignee: r.landmann(a)redhat.com
Reporter: wboessen(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: c.david86(a)gmail.com,
java-sig-commits(a)lists.fedoraproject.org,
mizdebsk(a)redhat.com, msimacek(a)redhat.com,
msrb(a)redhat.com, rhbugs(a)n-dimensional.de,
r.landmann(a)redhat.com
Created attachment 1087917
--> https://bugzilla.redhat.com/attachment.cgi?id=1087917&action=edit
Complete output from fop on a failed run.
Description of problem:
When building a PDF from a .fo file on F23, some, but not all,
external-graphic elements with a relative path to a file will generate a
"SEVERE: File not found" image.
Version-Release number of selected component (if applicable): fop-2.0-2
How reproducible:
Always
Steps to Reproduce:
1. Have a directory tree like this:
test.fo
Common_Content/images/note.svg
2. include a tag like this in test.fo
<fo:external-graphic width="auto" height="auto" content-width="24pt"
src="url(Common_Content/images/note.svg)"/>
3. run fop
Actual results:
Lots of tracebacks about missing images
Expected results:
PDF renders with images, like fop-1.1 did.
Additional info:
The errors for missing images can be interesting, as the path they refer to has
the leading part doubled. The actual PDF does have empty gaps of the correct
size for the missing image.
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=HNt46vlCn3&a=cc_unsubscribe
6 years, 9 months
[Bug 1256390] New: Complaint about jpackage-utils is out of date
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1256390
Bug ID: 1256390
Summary: Complaint about jpackage-utils is out of date
Product: Fedora
Version: rawhide
Component: fedora-review-plugin-java
Assignee: msimacek(a)redhat.com
Reporter: jonathan.underwood(a)gmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: java-sig-commits(a)lists.fedoraproject.org,
mizdebsk(a)redhat.com, msimacek(a)redhat.com,
msrb(a)redhat.com
Description of problem:
Currently fedora-review will complain thusly:
- Packages have proper BuildRequires/Requires on jpackage-utils
if a BR/R on jpackage-utils is missing. However, jpackage-utils is now provided
by the (renamed) package javapackages-tools, and so:
1) fedora-review should be looking for a BR/R on javapackages-tools, not
jpackage-utils
2) fedora-review could also complain if a BR/R for jpackage-utils is found, and
recommend it is replaced with javapackages-tools
Version-Release number of selected component (if applicable):
fedora-review.noarch 0.6.0-1.fc22
fedora-review-plugin-java.noarch 4.6.1-1.fc22
fedora-review-tests.noarch 0.6.0-1.fc22
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=zhZkEuTsDs&a=cc_unsubscribe
_______________________________________________
java-sig-commits mailing list
java-sig-commits(a)lists.fedoraproject.org
http://lists.fedoraproject.org/postorius/java-sig-commits@lists.fedorapro...
6 years, 9 months
[Bug 1222573] New: CVE-2014-7810 Tomcat/JbossWeb: security manager bypass via EL expressions
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1222573
Bug ID: 1222573
Summary: CVE-2014-7810 Tomcat/JbossWeb: security manager bypass
via EL expressions
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: mprpic(a)redhat.com
CC: aileenc(a)redhat.com, alazarot(a)redhat.com,
alee(a)redhat.com, asantos(a)redhat.com,
aszczucz(a)redhat.com, bdawidow(a)redhat.com,
bgollahe(a)redhat.com, ccoleman(a)redhat.com,
cdewolf(a)redhat.com, chazlett(a)redhat.com,
dandread(a)redhat.com, darran.lofthouse(a)redhat.com,
dknox(a)redhat.com, dmcphers(a)redhat.com,
epp-bugs(a)redhat.com, etirelli(a)redhat.com,
felias(a)redhat.com, gvarsami(a)redhat.com,
hchiorea(a)redhat.com, hfnukal(a)redhat.com,
ivan.afonichev(a)gmail.com, jason.greene(a)redhat.com,
java-sig-commits(a)lists.fedoraproject.org,
jawilson(a)redhat.com, jboss-set(a)redhat.com,
jbpapp-maint(a)redhat.com, jclere(a)redhat.com,
jcoleman(a)redhat.com, jdg-bugs(a)redhat.com,
jdoyle(a)redhat.com, jialiu(a)redhat.com,
joelsmith(a)redhat.com, jokerman(a)redhat.com,
jolee(a)redhat.com, jpallich(a)redhat.com,
kanderso(a)redhat.com, kconner(a)redhat.com,
krzysztof.daniel(a)gmail.com, kseifried(a)redhat.com,
ldimaggi(a)redhat.com, lgao(a)redhat.com,
lkocman(a)redhat.com, lmeyer(a)redhat.com,
lpetrovi(a)redhat.com, mbaluch(a)redhat.com,
me(a)coolsvap.net, mfranc(a)redhat.com,
mmccomas(a)redhat.com, mweiler(a)redhat.com,
mwinkler(a)redhat.com, myarboro(a)redhat.com,
nwallace(a)redhat.com, pavelp(a)redhat.com,
pgier(a)redhat.com, pslavice(a)redhat.com,
rhq-maint(a)redhat.com, rrajasek(a)redhat.com,
rsvoboda(a)redhat.com, rwagner(a)redhat.com,
rzhang(a)redhat.com,
soa-p-jira(a)post-office.corp.redhat.com,
spinder(a)redhat.com, tcunning(a)redhat.com,
theute(a)redhat.com, tkirby(a)redhat.com,
tmlcoch(a)redhat.com, ttarrant(a)redhat.com,
twalsh(a)redhat.com, vhalbert(a)redhat.com,
vtunka(a)redhat.com, weli(a)redhat.com
It was found that the expression language resolver evaluated expressions within
a privileged code section. A malicious web application could use this flaw to
bypass security manager protections.
Upstream patches:
http://svn.apache.org/viewvc?view=revision&revision=1644019
http://svn.apache.org/viewvc?view=revision&revision=1645644
External References:
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.44
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.59
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.17
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=Ve028TaWS0&a=cc_unsubscribe
7 years, 4 months