From 01ab29535d61ba0ace3573622c9edea391b256c5d1414594066fd8058307b21e Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Tom=C3=A1=C5=A1=20Chv=C3=A1tal?= Date: Thu, 8 Nov 2018 09:51:38 +0000 Subject: [PATCH] Accepting request 647242 from home:lnussel:branches:Java:packages Please submit this to Factory instead of the current one. It allows to have an incremental diff to SLE15. OBS-URL: https://build.opensuse.org/request/show/647242 OBS-URL: https://build.opensuse.org/package/show/Java:packages/axis?expand=0&rev=36 --- axis.changes | 2 +- axis.spec | 6 +++--- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/axis.changes b/axis.changes index a9af549..7a3fd85 100644 --- a/axis.changes +++ b/axis.changes @@ -1,5 +1,5 @@ ------------------------------------------------------------------- -Mon Nov 5 11:43:14 UTC 2018 - Pedro Monreal Gonzalez +Fri Sep 7 12:34:28 UTC 2018 - pmonrealgonzalez@suse.com - Security fix: [bsc#1103658, CVE-2018-8032] * Apache Axis 1.x up to and including 1.4 is vulnerable to a diff --git a/axis.spec b/axis.spec index c09bfe4..9e7ede0 100644 --- a/axis.spec +++ b/axis.spec @@ -12,7 +12,7 @@ # license that conforms to the Open Source Definition (Version 1.9) # published by the Open Source Initiative. -# Please submit bugfixes or comments via https://bugs.opensuse.org/ +# Please submit bugfixes or comments via http://bugs.opensuse.org/ # @@ -47,9 +47,9 @@ Patch3: axis-ant-build.patch Patch4: axis-encoding.patch Patch5: axis-compareto.patch Patch6: axis-enum.patch -Patch7: axis-jdk11.patch # PATCH-FIX-UPSTREAM bsc#1103658 CVE-2018-8032 cross-site scripting (XSS) attack in the default servlet/services -Patch8: axis-CVE-2018-8032.patch +Patch7: axis-CVE-2018-8032.patch +Patch8: axis-jdk11.patch BuildRequires: ant BuildRequires: ant-jdepend BuildRequires: antlr