Plan for OpenMRS Core 2.0.x

Build: #62 was successful Changes by Justine Tunney <jtunney@gmail.com>

Stages & jobs

  1. Build and Test

  2. Deploy

  3. Release

    Requires a user to start manually

Build result summary

Details

Completed
Queue duration
3 minutes
Duration
13 minutes
Labels
None
Revisions
openmrs-core
4f833a36953733b6fb39e79254ab7ec86ab267e7 4f833a36953733b6fb39e79254ab7ec86ab267e7
openmrs-standalone
777fbe8dcab15eccf4785771e54ddff965027fbc 777fbe8dcab15eccf4785771e54ddff965027fbc
Release scripts
a9c6b4741f415820e397e9b150cf80baca7f9368 a9c6b4741f415820e397e9b150cf80baca7f9368
Total tests
3273
Successful since
#57 ()

Tests

Code commits

openmrs-core
Author Commit Message Commit date
Justine Tunney <jtunney@gmail.com> Justine Tunney <jtunney@gmail.com> 4f833a36953733b6fb39e79254ab7ec86ab267e7 4f833a36953733b6fb39e79254ab7ec86ab267e7 Upgrade Apache Commons Collections to v3.2.2
Version 3.2 has a CVSS 10.0 vulnerability. That's the worst kind of
vulnerability that exists. By merely existing on the classpath, this
library causes the Java serialization parser for the entire JVM process
to go from being a state machine to a turing machine. A turing machine
with an exec() function!

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8103
https://commons.apache.org/proper/commons-collections/security-reports.html
http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/
(cherry picked from commit 07440b9823d7c62342846d0e788dacbe069be8b0)