https://bugzilla.redhat.com/show_bug.cgi?id=1015460
Bug ID: 1015460
Summary: spymemcached 2.10.0 is available
Product: Fedora
Version: rawhide
Component: spymemcached
Assignee: puntogil(a)libero.it
Reporter: puntogil(a)libero.it
QA Contact: extras-qa(a)fedoraproject.org
CC: java-sig-commits(a)lists.fedoraproject.org,
puntogil(a)libero.it
Upstream released spymemcached 2.10.0.
Currently, we still have version 2.9.0 in Rawhide.
Consider updating.
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=vS6Uy74uFl&a=cc_unsubscribe
https://bugzilla.redhat.com/show_bug.cgi?id=861391
Bug ID: 861391
Keywords: FutureFeature, Triaged
QA Contact: extras-qa(a)fedoraproject.org
Severity: unspecified
Version: rawhide
Priority: unspecified
CC: java-sig-commits(a)lists.fedoraproject.org,
jcapik(a)redhat.com
Assignee: jcapik(a)redhat.com
Summary: jgoodies-animation-1_4_2 is available
Regression: ---
Story Points: ---
Classification: Fedora
OS: Unspecified
Reporter: upstream-release-monitoring(a)fedoraproject.org
Type: ---
Documentation: ---
Hardware: Unspecified
Mount Type: ---
Status: NEW
Component: jgoodies-animation
Product: Fedora
Latest upstream release: 1_4_2
Current version in Fedora Rawhide: 1.3.0
URL: http://www.jgoodies.com/downloads/libraries/
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1051743
Bug ID: 1051743
Summary: tomcat-jsvc service fails to start server
Product: Fedora
Version: 19
Component: tomcat
Assignee: ivan.afonichev(a)gmail.com
Reporter: wdouglascampbell(a)hotmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: akurtako(a)redhat.com, ivan.afonichev(a)gmail.com,
java-sig-commits(a)lists.fedoraproject.org,
krzysztof.daniel(a)gmail.com
Description of problem:
Systemd does not successfully start tomcat daemon after upgrade to fc19
Version-Release number of selected component (if applicable):
tomcat-jsvc-7.0.47-1.fc19.noarch
How reproducible:
Always fails to work since upgrade.
Steps to Reproduce:
1. systemctl start tomcat-jsvc.service
2.
3.
Actual results:
No response. No Tomcat running. The following line appears to catalina.out:
Service exit with a return value of 143
Expected results:
Tomcat server daemon running
Additional info:
While this isn't working using system, if I type:
/usr/sbin/tomcat-jsvc-sysd start
the tomcat daemon starts and works fine.
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=uuJtkYIBh6&a=cc_unsubscribe
https://bugzilla.redhat.com/show_bug.cgi?id=1102152
Bug ID: 1102152
Summary: CVE-2014-0096 Apache Tomcat: XXE vulnerability via
user supplied XSLTs [fedora-all]
Product: Fedora
Version: 20
Component: tomcat
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Assignee: ivan.afonichev(a)gmail.com
Reporter: aneelica(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: ivan.afonichev(a)gmail.com,
java-sig-commits(a)lists.fedoraproject.org,
krzysztof.daniel(a)gmail.com
Blocks: 1088342 (CVE-2014-0096)
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When creating a Bodhi update request, use the bodhi submission link noted
in the next comment(s). This will include the bug IDs of this tracking
bug as well as the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
Bodhi notes field when available.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1088342
[Bug 1088342] CVE-2014-0096 Apache Tomcat: XXE vulnerability via user
supplied XSLTs
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=DrFKA9rqrC&a=cc_unsubscribe
https://bugzilla.redhat.com/show_bug.cgi?id=1017702
Bug ID: 1017702
Summary: javapackages-tools: Incorrect requires on package
providing filesystem
Product: Fedora
Version: rawhide
Component: javapackages-tools
Assignee: sochotni(a)redhat.com
Reporter: mizdebsk(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: java-sig-commits(a)lists.fedoraproject.org,
mizdebsk(a)redhat.com, msrb(a)redhat.com,
sochotni(a)redhat.com
Description of problem:
Packages with non-empty <namespace> have auto-requires on jpackage-utils
instead on <namespace>-runtime.
Version-Release number of selected component (if applicable):
3.3.1-1
Steps to Reproduce:
Run autorequires generator for package with the following fragment:
$ cat depmap.xml
<?xml version="1.0" encoding="US-ASCII"?>
<!-- This depmap file was generated by XMvn -->
<dependencyMap>
<dependency>
<maven>
<namespace>maven31</namespace>
<groupId>org.eclipse.aether</groupId>
<artifactId>aether-api</artifactId>
<version>0.9.0.M3</version>
</maven>
<jpp>
<namespace>maven31</namespace>
<groupId>JPP/maven31-aether</groupId>
<artifactId>aether-api</artifactId>
</jpp>
</dependency>
</dependencyMap>
Actual results:
Generated Requires is:
jpackage-utils
Expected results:
Generated Requires should be:
maven31-runtime
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=GVVUPaGAHS&a=cc_unsubscribe