https://bugzilla.redhat.com/show_bug.cgi?id=1189956
Bug ID: 1189956
Summary: ZooKeeper client (zkCli.sh) fails to start
Product: Fedora
Version: 21
Component: zookeeper
Severity: urgent
Assignee: tstclair(a)redhat.com
Reporter: ctubbsii-fedora(a)apache.org
QA Contact: extras-qa(a)fedoraproject.org
CC: ethan(a)ethantuttle.com,
java-sig-commits(a)lists.fedoraproject.org,
jeff(a)ocjtech.us, s(a)shk.io, tstclair(a)redhat.com
Created attachment 988644
--> https://bugzilla.redhat.com/attachment.cgi?id=988644&action=edit
stack trace
Description of problem:
zkCli.sh fails to start, due to classpath issues
Version-Release number of selected component (if applicable):
zookeeper-3.4.6-2.fc21.x86_64
How reproducible:
Always
Steps to Reproduce:
1. yum install zookeeper
2. zkCli.sh
Actual results:
A ClassNotFoundException occurs regarding a log4j LogManager class.
Expected results:
Connect to specified zookeeper service or error message about service not
running.
Additional info:
May be related to #1181487
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=n1BwQYSngu&a=cc_unsubscribe
https://bugzilla.redhat.com/show_bug.cgi?id=1256132
Bug ID: 1256132
Summary: aqute-bnd-3.0.0.RC1 is available
Product: Fedora
Version: rawhide
Component: aqute-bnd
Keywords: FutureFeature, Triaged
Assignee: msimacek(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: java-sig-commits(a)lists.fedoraproject.org,
jcapik(a)redhat.com, mizdebsk(a)redhat.com,
msimacek(a)redhat.com, msrb(a)redhat.com
Latest upstream release: 3.0.0.RC1
Current version/release in rawhide: 2.4.1-2.fc24
URL: https://github.com/bndtools/bnd/
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=iFwikcyTo3&a=cc_unsubscribe
_______________________________________________
java-sig-commits mailing list
java-sig-commits(a)lists.fedoraproject.org
http://lists.fedoraproject.org/postorius/java-sig-commits@lists.fedoraproje…
https://bugzilla.redhat.com/show_bug.cgi?id=1257248
Bug ID: 1257248
Summary: CVE-2015-6524 activemq: LDAPLoginModule implementation
allows wildcard operators in usernames [fedora-all]
Product: Fedora
Version: 22
Component: activemq
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: s(a)shk.io
Reporter: amaris(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: agrimm(a)redhat.com,
java-sig-commits(a)lists.fedoraproject.org, s(a)shk.io,
tdawson(a)redhat.com
Blocks: 1257246 (CVE-2015-6524)
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1257246
[Bug 1257246] CVE-2015-6524 activemq: LDAPLoginModule implementation allows
wildcard operators in usernames
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=VWYAR5LHDy&a=cc_unsubscribe
_______________________________________________
java-sig-commits mailing list
java-sig-commits(a)lists.fedoraproject.org
http://lists.fedoraproject.org/postorius/java-sig-commits@lists.fedoraproje…
https://bugzilla.redhat.com/show_bug.cgi?id=1215061
Bug ID: 1215061
Summary: springframework-batch-2.2.7.RELEASE is available
Product: Fedora
Version: rawhide
Component: springframework-batch
Assignee: puntogil(a)libero.it
Reporter: puntogil(a)libero.it
QA Contact: extras-qa(a)fedoraproject.org
CC: java-sig-commits(a)lists.fedoraproject.org,
msrb(a)redhat.com, puntogil(a)libero.it
Latest upstream release: 2.2.7.RELEASE
Current version/release in Fedora Rawhide: 2.1.9-3.fc23
URL: https://github.com/spring-projects/spring-batch/tags
Please, consider upgrading
Additional info:
some build deps are not free:
org.springframework.data:spring-data-neo4j
org.springframework.data:spring-data-gemfire
some build deps are still not available
org.springframework.data:spring-data-commons
org.springframework.data:spring-data-mongodb
(https://bugzilla.redhat.com/show_bug.cgi?id=1178257)
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=age15Afo6i&a=cc_unsubscribe
https://bugzilla.redhat.com/show_bug.cgi?id=1205632
Bug ID: 1205632
Summary: CVE-2015-1811 jenkins: External entity processing in
XML can reveal sensitive local files (SECURITY-167)
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: vkaigoro(a)redhat.com
CC: bleanhar(a)redhat.com, ccoleman(a)redhat.com,
dmcphers(a)redhat.com,
java-sig-commits(a)lists.fedoraproject.org,
jdetiber(a)redhat.com, jialiu(a)redhat.com,
jkeck(a)redhat.com, joelsmith(a)redhat.com,
jokerman(a)redhat.com, kseifried(a)redhat.com,
lmeyer(a)redhat.com, mmccomas(a)redhat.com,
msrb(a)redhat.com
This vulnerability allows attackers to create malicious XML documents and feed
that into Jenkins, which causes Jenkins to retrieve arbitrary XML document on
the server, resulting in the exposure of sensitive information inside/outside
Jenkins.
External References:
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015…
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=ZHDBSZCgVg&a=cc_unsubscribe