https://bugzilla.redhat.com/show_bug.cgi?id=1385636
Bug ID: 1385636
Summary: maven-pmd-plugin-3.7 is available
Product: Fedora
Version: rawhide
Component: maven-pmd-plugin
Keywords: FutureFeature, Triaged
Assignee: mat.booth(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: java-sig-commits(a)lists.fedoraproject.org,
mat.booth(a)redhat.com, mizdebsk(a)redhat.com
Latest upstream release: 3.7
Current version/release in rawhide: 3.6-2.fc24
URL: http://repo2.maven.org/maven2/org/apache/maven/plugins/maven-pmd-plugin/
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from anitya:
https://release-monitoring.org/project/1921/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1337994
Bug ID: 1337994
Summary: Please include Jenkins in EPEL
Product: Fedora
Version: rawhide
Component: jenkins
Assignee: msrb(a)redhat.com
Reporter: jindrich.novy(a)morganstanley.com
QA Contact: extras-qa(a)fedoraproject.org
CC: java-sig-commits(a)lists.fedoraproject.org,
mizdebsk(a)redhat.com, msrb(a)redhat.com
Hi,
it would be hugely beneficial if there would be a possibility to introduce
Jenkins to EPEL6 and 7 branches. Assuming you have already received such a
request in history. Is there a technical reason which prevents Jenkins from
being included in EPEL?
Thanks for looking into it.
Kind Regards,
Jindrich Novy
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1357218
Bug ID: 1357218
Summary: EPEL7 plans for google-gson
Product: Fedora
Version: rawhide
Component: google-gson
Assignee: msimacek(a)redhat.com
Reporter: rosser.bjr(a)gmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: jaromir.capik(a)email.cz,
java-sig-commits(a)lists.fedoraproject.org,
jerboaa(a)gmail.com, mizdebsk(a)redhat.com,
msimacek(a)redhat.com
Description of problem: Are you interested in providing google-gson for EPEL7?
It is a dependency of reflections, which is a dependency of a Java application
I'm thinking of packaging for both Fedora and EPEL [1]. I just tested a mock
build of google-gson on EPEL7 and it built without issue.
Additional info: I'm filing a bug as per the wiki instructions on how to get a
Fedora package in EPEL [2], as none of the package maintainers appear on the
"not interested in EPEL" list [3].
[1] https://github.com/robertjanetzko/LegendsBrowser
[2] https://fedoraproject.org/wiki/Getting_a_Fedora_package_in_EPEL
[3] https://fedoraproject.org/wiki/EPEL/ContributorStatusNo
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1400319
Bug ID: 1400319
Summary: takari-archiver-0.1.17 is available
Product: Fedora
Version: rawhide
Component: takari-archiver
Keywords: FutureFeature, Triaged
Assignee: mizdebsk(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: java-sig-commits(a)lists.fedoraproject.org,
mizdebsk(a)redhat.com, msimacek(a)redhat.com
Latest upstream release: 0.1.17
Current version/release in rawhide: 0.1.15-1.fc25
URL: http://takari.io
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from anitya:
https://release-monitoring.org/project/9578/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1400128
Bug ID: 1400128
Summary: checkstyle-7.3 is available
Product: Fedora
Version: rawhide
Component: checkstyle
Keywords: FutureFeature, Triaged
Assignee: mizdebsk(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: dbhole(a)redhat.com,
java-sig-commits(a)lists.fedoraproject.org,
mizdebsk(a)redhat.com, msimacek(a)redhat.com
Latest upstream release: 7.3
Current version/release in rawhide: 7.1.2-1.fc26
URL: http://sourceforge.net/projects/checkstyle
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from anitya:
https://release-monitoring.org/project/275/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=652183
gil cattaneo <puntogil(a)libero.it> changed:
What |Removed |Added
----------------------------------------------------------------------------
Depends On|1331449 |
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1331449
[Bug 1331449] Review Request: zkclient - A Zookeeper Client
--
You are receiving this mail because:
You are the QA Contact for the bug.
You are the assignee for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1395172
Bug ID: 1395172
Summary: CVE-2016-9299 jenkins: Java deserialization flaw leads
to RCE
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: high
Priority: high
Assignee: security-response-team(a)redhat.com
Reporter: amaris(a)redhat.com
CC: abhgupta(a)redhat.com, bleanhar(a)redhat.com,
ccoleman(a)redhat.com, dedgar(a)redhat.com,
dmcphers(a)redhat.com,
java-sig-commits(a)lists.fedoraproject.org,
jgoulding(a)redhat.com, jialiu(a)redhat.com,
jkeck(a)redhat.com, joelsmith(a)redhat.com,
jokerman(a)redhat.com, kseifried(a)redhat.com,
lmeyer(a)redhat.com, mizdebsk(a)redhat.com,
mmccomas(a)redhat.com, msrb(a)redhat.com,
tdawson(a)redhat.com, tiwillia(a)redhat.com
An unauthenticated remote code execution vulnerability was discovered in the
Jenkins continuous integration and continuous delivery automation server. A
serialized Java object transferred to the Jenkins CLI can make Jenkins connect
to an attacker-controlled LDAP server, which in turn can send a serialized
payload leading to code execution, bypassing existing protection mechanisms.
Upstream advisory:
https://groups.google.com/forum/#!msg/jenkinsci-advisories/-fc-w9tNEJE/GRvEā¦
Mitigation:
https://github.com/jenkinsci-cert/SECURITY-218
CVE assignment:
http://seclists.org/oss-sec/2016/q4/423
--
You are receiving this mail because:
You are on the CC list for the bug.