The following Fedora EPEL 8 Security updates need testing: Age URL 2 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-7f0ce51dbd python-bleach-3.1.4-2.el8
The following builds have been pushed to Fedora EPEL 8 updates-testing
amavisd-milter-1.7.0-1.el8 batctl-2020.1-1.el8 boinc-client-7.16.6-3.el8 chromium-81.0.4044.122-1.el8 fldigi-4.1.12-1.el8 libgdiplus-6.0.4-2.el8 openvpn-2.4.9-1.el8 perl-B-COW-0.004-2.el8 perl-Parse-EDID-1.0.7-5.el8 pgbouncer-1.12.0-5.el8 pxz-4.999.9-19.beta.20200421git.el8 tcl-tclxml-3.2-26.el8 twa-1.9.1-1.el8
Details about builds:
================================================================================ amavisd-milter-1.7.0-1.el8 (FEDORA-EPEL-2020-442d0a579d) Sendmail milter for amavisd-new using the AM.PDP protocol -------------------------------------------------------------------------------- Update Information:
# amavisd-milter amavisd-milter has been moved from SourceForge to to GitHub. ## New features - Fork after initializing milter socket - Use `client_name` if available instead of hostname passed to `xxfi_connect` - Generate `amavisd- milter.8` from `AMAVISD-MILTER.md` # Bug and compatibility fixes - Fixed compiler warnings - Converted indentation to spaces only - Removed obsoleted file `amavisd-milter.spec` -------------------------------------------------------------------------------- ChangeLog:
* Wed Apr 22 2020 Robert Scheck robert@fedoraproject.org 1.7.0-1 - Upgrade to 1.7.0 (#1824332) * Tue Jan 28 2020 Fedora Release Engineering releng@fedoraproject.org - 1.6.1-6 - Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild -------------------------------------------------------------------------------- References:
[ 1 ] Bug #1824332 - amavisd-milter 1.7.0 available https://bugzilla.redhat.com/show_bug.cgi?id=1824332 --------------------------------------------------------------------------------
================================================================================ batctl-2020.1-1.el8 (FEDORA-EPEL-2020-83ac0508a4) B.A.T.M.A.N. advanced control and management tool -------------------------------------------------------------------------------- Update Information:
Update to 2020.1 -------------------------------------------------------------------------------- ChangeLog:
* Fri Apr 24 2020 Felix Kaechele heffer@fedoraproject.org - 2020.1-1 - update to 2020.1 --------------------------------------------------------------------------------
================================================================================ boinc-client-7.16.6-3.el8 (FEDORA-EPEL-2020-78fe365995) The BOINC client -------------------------------------------------------------------------------- Update Information:
Removed broken user idle time detection. If you happen to see "computer in use" as working unit status, please leave a comment below ---- 7.16.6 release -------------------------------------------------------------------------------- ChangeLog:
* Thu Apr 23 2020 Germano Massullo germano.massullo@gmail.com - 7.16.6-3 - Updated disable_idle_time_detection.patch * Sat Apr 11 2020 Germano Massullo germano.massullo@gmail.com - 7.16.6-2 - Added disable_idle_time_detection.patch * Thu Apr 9 2020 Germano Massullo germano.massullo@gmail.com - 7.16.1-7 - 7.16.6 release - Removed cc_config_cpp_3249.patch - Disabled disabled_idle_detection.patch. Read https://bugzilla.redhat.com/show_bug.cgi?id=1822723 * Tue Jan 28 2020 Fedora Release Engineering releng@fedoraproject.org - 7.16.1-6 - Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild -------------------------------------------------------------------------------- References:
[ 1 ] Bug #1822723 - Disable idle time detection https://bugzilla.redhat.com/show_bug.cgi?id=1822723 --------------------------------------------------------------------------------
================================================================================ chromium-81.0.4044.122-1.el8 (FEDORA-EPEL-2020-72116e7775) A WebKit (Blink) powered web browser -------------------------------------------------------------------------------- Update Information:
Will Chromium stop releasing updates long enough for one to make it to EPEL stable? Probably not. This one fixes: CVE-2020-6458 CVE-2020-6459 CVE-2020-6460 ---- Fix dependency issue introduced when switching from a "shared" build to a "static" build. ---- A new major version of Chromium without any security bugs! Just kidding. Here's the CVE list: CVE-2020-6454 CVE-2020-6423 CVE-2020-6455 CVE-2020-6430 CVE-2020-6456 CVE-2020-6431 CVE-2020-6433 CVE-2020-6434 CVE-2020-6435 CVE-2020-6436 CVE-2020-6437 CVE-2020-6438 CVE-2020-6439 CVE-2020-6440 CVE-2020-6441 CVE-2020-6442 CVE-2020-6443 CVE-2020-6444 CVE-2020-6445 CVE-2020-6446 CVE-2020-6447 CVE-2020-6448 CVE-2020-6432 CVE-2020-6457 Oh, and this build switches over to a static build, so the chromium-libs and chromium-libs-media subpackages are now obsolete, but it should be slightly better for performance. ---- Bugfix release from Google for 80.0.3987.162. ---- Update to 80.0.3987.162. Fixes the following CVEs: * CVE-2020-6450 * CVE-2020-6451 ��� CVE-2020-6452 ---- Update to 80.0.3987.149. Upstream says it fixes "13" security issues, but only lists these CVEs: * CVE-2020-6422: Use after free in WebGL * CVE-2020-6424: Use after free in media * CVE-2020-6425: Insufficient policy enforcement in extensions. * CVE-2020-6426: Inappropriate implementation in V8 * CVE-2020-6427: Use after free in audio * CVE-2020-6428: Use after free in audio * CVE-2020-6429: Use after free in audio. * CVE-2019-20503: Out of bounds read in usersctplib. * CVE-2020-6449: Use after free in audio ---- Update to 80.0.3987.132. Lots of security fixes here. VAAPI re-enabled by default (except on nvidia). List of CVEs fixed (since last update): * CVE-2019-20446 * CVE-2020-6381 * CVE-2020-6382 * CVE-2020-6383 * CVE-2020-6384 * CVE-2020-6385 * CVE-2020-6386 * CVE-2020-6387 * CVE-2020-6388 * CVE-2020-6389 * CVE-2020-6390 * CVE-2020-6391 * CVE-2020-6392 * CVE-2020-6393 * CVE-2020-6394 * CVE-2020-6395 * CVE-2020-6396 * CVE-2020-6397 * CVE-2020-6398 * CVE-2020-6399 * CVE-2020-6400 * CVE-2020-6401 * CVE-2020-6402 * CVE-2020-6403 * CVE-2020-6404 * CVE-2020-6405 * CVE-2020-6406 * CVE-2020-6407 * CVE-2020-6408 * CVE-2020-6409 * CVE-2020-6410 * CVE-2020-6411 * CVE-2020-6412 * CVE-2020-6413 * CVE-2020-6414 * CVE-2020-6415 * CVE-2020-6416 * CVE-2020-6417 * CVE-2020-6418 * CVE-2020-6420 -------------------------------------------------------------------------------- ChangeLog:
* Thu Apr 23 2020 Tom Callaway spot@fedoraproject.org - 81.0.4044.122-1 - update to 81.0.4044.122 * Tue Apr 21 2020 Tom Callaway spot@fedoraproject.org - 81.0.4044.113-2 - add explicit Requires: chromium-common * Thu Apr 16 2020 Tom Callaway spot@fedoraproject.org - 81.0.4044.113-1 - update to 81.0.4044.113 * Mon Apr 13 2020 Tom Callaway spot@fedoraproject.org - 81.0.4044.92-1 - update to 81.0.4044.92 - squelch the selinux output in the post scriptlet - add Provides/Obsoletes in case we're build with shared set to 0 - add ulimit -n 4096 (needed for static builds, probably not harmful for shared builds either) - do static build * Sat Apr 4 2020 Tom Callaway spot@fedoraproject.org - 80.0.3987.163-1 - update to 80.0.3987.163 * Wed Apr 1 2020 Tom Callaway spot@fedoraproject.org - 80.0.3987.162-1 - update to 80.0.3987.162 * Wed Mar 18 2020 Tom Callaway spot@fedoraproject.org - 80.0.3987.149-1 - update to 80.0.3987.149 * Thu Feb 27 2020 Tom Callaway spot@fedoraproject.org - 80.0.3987.132-1 - update to 80.0.3987.132 - disable C++17 changes (this means f32+ will no longer build, but it segfaulted immediately) * Thu Feb 27 2020 Tom Callaway spot@fedoraproject.org - 80.0.3987.122-1 - update to 80.0.3987.122 * Mon Feb 17 2020 Tom Callaway spot@fedoraproject.org - 80.0.3987.106-1 - update to 80.0.3987.106 * Wed Feb 5 2020 Tom Callaway spot@fedoraproject.org - 80.0.3987.87-1 - update to 80.0.3987.87 * Tue Jan 28 2020 Fedora Release Engineering releng@fedoraproject.org - 79.0.3945.130-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild -------------------------------------------------------------------------------- References:
[ 1 ] Bug #1797608 - CVE-2019-20446 librsvg: Resource exhaustion via crafted SVG file with nested patterns https://bugzilla.redhat.com/show_bug.cgi?id=1797608 [ 2 ] Bug #1801160 - CVE-2020-6381 chromium-browser: Integer overflow in JavaScript https://bugzilla.redhat.com/show_bug.cgi?id=1801160 [ 3 ] Bug #1801161 - CVE-2020-6382 chromium-browser: Type Confusion in JavaScript https://bugzilla.redhat.com/show_bug.cgi?id=1801161 [ 4 ] Bug #1801162 - CVE-2020-6385 chromium-browser: Insufficient policy enforcement in storage https://bugzilla.redhat.com/show_bug.cgi?id=1801162 [ 5 ] Bug #1801163 - CVE-2020-6387 chromium-browser: Out of bounds write in WebRTC https://bugzilla.redhat.com/show_bug.cgi?id=1801163 [ 6 ] Bug #1801164 - CVE-2020-6388 chromium-browser: Out of bounds memory access in WebAudio https://bugzilla.redhat.com/show_bug.cgi?id=1801164 [ 7 ] Bug #1801165 - CVE-2020-6389 chromium-browser: Out of bounds write in WebRTC https://bugzilla.redhat.com/show_bug.cgi?id=1801165 [ 8 ] Bug #1801166 - CVE-2020-6390 chromium-browser: Out of bounds memory access in streams https://bugzilla.redhat.com/show_bug.cgi?id=1801166 [ 9 ] Bug #1801167 - CVE-2020-6391 chromium-browser: Insufficient validation of untrusted input in Blink https://bugzilla.redhat.com/show_bug.cgi?id=1801167 [ 10 ] Bug #1801168 - CVE-2020-6392 chromium-browser: Insufficient policy enforcement in extensions https://bugzilla.redhat.com/show_bug.cgi?id=1801168 [ 11 ] Bug #1801169 - CVE-2020-6393 chromium-browser: Insufficient policy enforcement in Blink https://bugzilla.redhat.com/show_bug.cgi?id=1801169 [ 12 ] Bug #1801170 - CVE-2020-6394 chromium-browser: Insufficient policy enforcement in Blink https://bugzilla.redhat.com/show_bug.cgi?id=1801170 [ 13 ] Bug #1801171 - CVE-2020-6395 chromium-browser: Out of bounds read in JavaScript https://bugzilla.redhat.com/show_bug.cgi?id=1801171 [ 14 ] Bug #1801172 - CVE-2020-6396 chromium-browser: Inappropriate implementation in Skia https://bugzilla.redhat.com/show_bug.cgi?id=1801172 [ 15 ] Bug #1801173 - CVE-2020-6397 chromium-browser: Incorrect security UI in sharing https://bugzilla.redhat.com/show_bug.cgi?id=1801173 [ 16 ] Bug #1801174 - CVE-2020-6398 chromium-browser: Uninitialized use in PDFium https://bugzilla.redhat.com/show_bug.cgi?id=1801174 [ 17 ] Bug #1801175 - CVE-2020-6399 chromium-browser: Insufficient policy enforcement in AppCache https://bugzilla.redhat.com/show_bug.cgi?id=1801175 [ 18 ] Bug #1801176 - CVE-2020-6400 chromium-browser: Inappropriate implementation in CORS https://bugzilla.redhat.com/show_bug.cgi?id=1801176 [ 19 ] Bug #1801177 - CVE-2020-6401 chromium-browser: Insufficient validation of untrusted input in Omnibox https://bugzilla.redhat.com/show_bug.cgi?id=1801177 [ 20 ] Bug #1801178 - CVE-2020-6402 chromium-browser: Insufficient policy enforcement in downloads https://bugzilla.redhat.com/show_bug.cgi?id=1801178 [ 21 ] Bug #1801179 - CVE-2020-6403 chromium-browser: Incorrect security UI in Omnibox https://bugzilla.redhat.com/show_bug.cgi?id=1801179 [ 22 ] Bug #1801180 - CVE-2020-6404 chromium-browser: Inappropriate implementation in Blink https://bugzilla.redhat.com/show_bug.cgi?id=1801180 [ 23 ] Bug #1801181 - CVE-2020-6405 sqlite: Out-of-bounds read in SELECT with ON/USING clause https://bugzilla.redhat.com/show_bug.cgi?id=1801181 [ 24 ] Bug #1801182 - CVE-2020-6406 chromium-browser: Use after free in audio https://bugzilla.redhat.com/show_bug.cgi?id=1801182 [ 25 ] Bug #1801184 - CVE-2020-6408 chromium-browser: Insufficient policy enforcement in CORS https://bugzilla.redhat.com/show_bug.cgi?id=1801184 [ 26 ] Bug #1801185 - CVE-2020-6409 chromium-browser: Inappropriate implementation in Omnibox https://bugzilla.redhat.com/show_bug.cgi?id=1801185 [ 27 ] Bug #1801186 - CVE-2020-6410 chromium-browser: Insufficient policy enforcement in navigation https://bugzilla.redhat.com/show_bug.cgi?id=1801186 [ 28 ] Bug #1801187 - CVE-2020-6411 chromium-browser: Insufficient validation of untrusted input in Omnibox https://bugzilla.redhat.com/show_bug.cgi?id=1801187 [ 29 ] Bug #1801188 - CVE-2020-6412 chromium-browser: Insufficient validation of untrusted input in Omnibox https://bugzilla.redhat.com/show_bug.cgi?id=1801188 [ 30 ] Bug #1801189 - CVE-2020-6413 chromium-browser: Inappropriate implementation in Blink https://bugzilla.redhat.com/show_bug.cgi?id=1801189 [ 31 ] Bug #1801190 - CVE-2020-6414 chromium-browser: Insufficient policy enforcement in Safe Browsing https://bugzilla.redhat.com/show_bug.cgi?id=1801190 [ 32 ] Bug #1801191 - CVE-2020-6415 chromium-browser: Inappropriate implementation in JavaScript https://bugzilla.redhat.com/show_bug.cgi?id=1801191 [ 33 ] Bug #1801192 - CVE-2020-6416 chromium-browser: Insufficient data validation in streams https://bugzilla.redhat.com/show_bug.cgi?id=1801192 [ 34 ] Bug #1801193 - CVE-2020-6417 chromium-browser: Inappropriate implementation in installer https://bugzilla.redhat.com/show_bug.cgi?id=1801193 [ 35 ] Bug #1807341 - chromium-browser: Out of bounds memory access in streams https://bugzilla.redhat.com/show_bug.cgi?id=1807341 [ 36 ] Bug #1807343 - CVE-2020-6418 chromium-browser: Type confusion in V8 https://bugzilla.redhat.com/show_bug.cgi?id=1807343 [ 37 ] Bug #1807349 - CVE-2020-10531 ICU: Integer overflow in UnicodeString::doAppend() https://bugzilla.redhat.com/show_bug.cgi?id=1807349 [ 38 ] Bug #1807381 - CVE-2020-6407 chromium-browser: Out of bounds memory access in streams https://bugzilla.redhat.com/show_bug.cgi?id=1807381 [ 39 ] Bug #1807498 - CVE-2020-6383 chromium-browser: Type confusion in V8 https://bugzilla.redhat.com/show_bug.cgi?id=1807498 [ 40 ] Bug #1807499 - CVE-2020-6384 chromium-browser: Use after free in WebAudio https://bugzilla.redhat.com/show_bug.cgi?id=1807499 [ 41 ] Bug #1807500 - CVE-2020-6386 chromium-browser: Use after free in speech https://bugzilla.redhat.com/show_bug.cgi?id=1807500 [ 42 ] Bug #1811073 - CVE-2020-6420 chromium-browser: Insufficient policy enforcement in media https://bugzilla.redhat.com/show_bug.cgi?id=1811073 [ 43 ] Bug #1815241 - CVE-2020-6424 chromium-browser: Use after free in media https://bugzilla.redhat.com/show_bug.cgi?id=1815241 [ 44 ] Bug #1815242 - CVE-2020-6425 chromium-browser: Insufficient policy enforcement in extensions https://bugzilla.redhat.com/show_bug.cgi?id=1815242 [ 45 ] Bug #1815243 - CVE-2020-6426 chromium-browser: Inappropriate implementation in V8 https://bugzilla.redhat.com/show_bug.cgi?id=1815243 [ 46 ] Bug #1815244 - CVE-2020-6427 chromium-browser: Use after free in audio https://bugzilla.redhat.com/show_bug.cgi?id=1815244 [ 47 ] Bug #1815245 - CVE-2020-6428 chromium-browser: Use after free in audio https://bugzilla.redhat.com/show_bug.cgi?id=1815245 [ 48 ] Bug #1815247 - CVE-2020-6429 chromium-browser: Use after free in audio https://bugzilla.redhat.com/show_bug.cgi?id=1815247 [ 49 ] Bug #1815248 - CVE-2020-6449 chromium-browser: Use after free in audio https://bugzilla.redhat.com/show_bug.cgi?id=1815248 [ 50 ] Bug #1815259 - CVE-2020-6422 chromium-browser: Use after free in WebGL https://bugzilla.redhat.com/show_bug.cgi?id=1815259 [ 51 ] Bug #1820155 - CVE-2020-6450 chromium-browser: Use after free in WebAudio https://bugzilla.redhat.com/show_bug.cgi?id=1820155 [ 52 ] Bug #1820156 - CVE-2020-6451 chromium-browser: Use after free in WebAudio https://bugzilla.redhat.com/show_bug.cgi?id=1820156 [ 53 ] Bug #1820157 - CVE-2020-6452 chromium-browser: Heap buffer overflow in media https://bugzilla.redhat.com/show_bug.cgi?id=1820157 [ 54 ] Bug #1822604 - CVE-2020-6454 chromium-browser: Use after free in extensions https://bugzilla.redhat.com/show_bug.cgi?id=1822604 [ 55 ] Bug #1822605 - CVE-2020-6423 chromium-browser: Use after free in audio https://bugzilla.redhat.com/show_bug.cgi?id=1822605 [ 56 ] Bug #1822606 - CVE-2020-6455 chromium-browser: Out of bounds read in WebSQL https://bugzilla.redhat.com/show_bug.cgi?id=1822606 [ 57 ] Bug #1822607 - CVE-2020-6430 chromium-browser: Type Confusion in V8 https://bugzilla.redhat.com/show_bug.cgi?id=1822607 [ 58 ] Bug #1822608 - CVE-2020-6456 chromium-browser: Insufficient validation of untrusted input in clipboard https://bugzilla.redhat.com/show_bug.cgi?id=1822608 [ 59 ] Bug #1822609 - CVE-2020-6431 chromium-browser: Insufficient policy enforcement in full screen https://bugzilla.redhat.com/show_bug.cgi?id=1822609 [ 60 ] Bug #1822610 - CVE-2020-6433 chromium-browser: Insufficient policy enforcement in extensions https://bugzilla.redhat.com/show_bug.cgi?id=1822610 [ 61 ] Bug #1822611 - CVE-2020-6434 chromium-browser: Use after free in devtools https://bugzilla.redhat.com/show_bug.cgi?id=1822611 [ 62 ] Bug #1822612 - CVE-2020-6435 chromium-browser: Insufficient policy enforcement in extensions https://bugzilla.redhat.com/show_bug.cgi?id=1822612 [ 63 ] Bug #1822613 - CVE-2020-6436 chromium-browser: Use after free in window management https://bugzilla.redhat.com/show_bug.cgi?id=1822613 [ 64 ] Bug #1822614 - CVE-2020-6437 chromium-browser: Inappropriate implementation in WebView https://bugzilla.redhat.com/show_bug.cgi?id=1822614 [ 65 ] Bug #1822615 - CVE-2020-6438 chromium-browser: Insufficient policy enforcement in extensions https://bugzilla.redhat.com/show_bug.cgi?id=1822615 [ 66 ] Bug #1822616 - CVE-2020-6439 chromium-browser: Insufficient policy enforcement in navigations https://bugzilla.redhat.com/show_bug.cgi?id=1822616 [ 67 ] Bug #1822617 - CVE-2020-6440 chromium-browser: Inappropriate implementation in extensions https://bugzilla.redhat.com/show_bug.cgi?id=1822617 [ 68 ] Bug #1822618 - CVE-2020-6441 chromium-browser: Insufficient policy enforcement in omnibox https://bugzilla.redhat.com/show_bug.cgi?id=1822618 [ 69 ] Bug #1822619 - CVE-2020-6442 chromium-browser: Inappropriate implementation in cache https://bugzilla.redhat.com/show_bug.cgi?id=1822619 [ 70 ] Bug #1822620 - CVE-2020-6443 chromium-browser: Insufficient data validation in developer tools https://bugzilla.redhat.com/show_bug.cgi?id=1822620 [ 71 ] Bug #1822621 - CVE-2020-6444 chromium-browser: Uninitialized use in WebRTC https://bugzilla.redhat.com/show_bug.cgi?id=1822621 [ 72 ] Bug #1822622 - CVE-2020-6445 chromium-browser: Insufficient policy enforcement in trusted types https://bugzilla.redhat.com/show_bug.cgi?id=1822622 [ 73 ] Bug #1822623 - CVE-2020-6446 chromium-browser: Insufficient policy enforcement in trusted types https://bugzilla.redhat.com/show_bug.cgi?id=1822623 [ 74 ] Bug #1822624 - CVE-2020-6447 chromium-browser: Inappropriate implementation in developer tools https://bugzilla.redhat.com/show_bug.cgi?id=1822624 [ 75 ] Bug #1822625 - CVE-2020-6448 chromium-browser: Use after free in V8 https://bugzilla.redhat.com/show_bug.cgi?id=1822625 [ 76 ] Bug #1824949 - CVE-2020-6457 chromium-browser: Use after free in speech recognizer https://bugzilla.redhat.com/show_bug.cgi?id=1824949 [ 77 ] Bug #1827379 - CVE-2020-6459 chromium-browser: Use after free in payments https://bugzilla.redhat.com/show_bug.cgi?id=1827379 [ 78 ] Bug #1827380 - CVE-2020-6460 chromium-browser: Insufficient data validation in URL formatting https://bugzilla.redhat.com/show_bug.cgi?id=1827380 [ 79 ] Bug #1827381 - CVE-2020-6458 chromium-browser: Out of bounds read and write in PDFium https://bugzilla.redhat.com/show_bug.cgi?id=1827381 --------------------------------------------------------------------------------
================================================================================ fldigi-4.1.12-1.el8 (FEDORA-EPEL-2020-cb78c04bd9) Digital modem program for Linux -------------------------------------------------------------------------------- Update Information:
Thu Apr 23 09:37:00 2020 - Version 4.1.12 TX auto RST-sent * add control-shift-s for inserting RST sent value in TX stream see http://www.w1hkj.com/FldigiHelp/keyboard_operation_page.html wwv * fix segmentation fault on Windows platform Win10 Socket debug * Added event level recording in socket class CW/DTR/RTS * restore missing Nordic characters on DTR-CW * enable PTT during CWIO processing * allow user to calibrate DTR-CW timing at nominal WPM - fractional computed values rounded to nearest integer i.e. round(0.5) => 1 * update documentation File/Audio * File selection caused cessation of audio processing while waiting for user selection. Results in cessation of signal processing including keep alive signals to flamp and flmsg if linked. - move all UI interaction to main thread trx testing * replace compiler macros with in-line code to aid in debugging AFTER macro * add AFTER tag to repeat macro after a delay of NN seconds CWID button * One more time to wrestle the wayward CWID button to the mat - fluid definition file "confdialog.fl" OK - needed to execute "make flgen" to create new confdialog.cxx/h files Thank you to all of the testers who helped bring this version to fruition. 73, David, W1HKJ -------------------------------------------------------------------------------- ChangeLog:
* Thu Apr 23 2020 Richard Shaw hobbes1069@gmail.com - 4.1.12-1 - Update to 4.1.12. * Sat Apr 4 2020 Richard Shaw hobbes1069@gmail.com - 4.1.11-2 - Rebuild for hamlib 4.0. --------------------------------------------------------------------------------
================================================================================ libgdiplus-6.0.4-2.el8 (FEDORA-EPEL-2020-26c48600ae) An Open Source implementation of the GDI+ API -------------------------------------------------------------------------------- Update Information:
First build for EPEL 8. -------------------------------------------------------------------------------- ChangeLog:
-------------------------------------------------------------------------------- References:
[ 1 ] Bug #1749560 - build of libgdiplus for EPEL 8 https://bugzilla.redhat.com/show_bug.cgi?id=1749560 --------------------------------------------------------------------------------
================================================================================ openvpn-2.4.9-1.el8 (FEDORA-EPEL-2020-b928468862) A full-featured SSL VPN solution -------------------------------------------------------------------------------- Update Information:
Update to latest upstream OpenVPN 2.4.9 release. It contains a security fix for CVE-2020-11810. This security issue is quite hard to abuse, requiring a fairly precise timing attack combined with guessing a just assigned peer-id reference. If successful, only a single client just initiating a new connection will experience a denial of service situation. This wi why the severity is rated low. -------------------------------------------------------------------------------- ChangeLog:
* Sun Apr 19 2020 David Sommerseth dazo@eurephia.org - 2.4.9-1 - Update to upstream OpenVPN 2.4.9 --------------------------------------------------------------------------------
================================================================================ perl-B-COW-0.004-2.el8 (FEDORA-EPEL-2020-eecc5afcda) Additional B helpers to check Copy On Write status -------------------------------------------------------------------------------- Update Information:
This is the first EPEL build of perl-B-COW, a module for determining the copy- on-write status of a variable. -------------------------------------------------------------------------------- ChangeLog:
-------------------------------------------------------------------------------- References:
[ 1 ] Bug #1826270 - Review Request: perl-B-COW - Additional B helpers to check Copy On Write status https://bugzilla.redhat.com/show_bug.cgi?id=1826270 --------------------------------------------------------------------------------
================================================================================ perl-Parse-EDID-1.0.7-5.el8 (FEDORA-EPEL-2020-affe217d30) Extended display identification data (EDID) parser -------------------------------------------------------------------------------- Update Information:
Add to EPEL 8 -------------------------------------------------------------------------------- ChangeLog:
--------------------------------------------------------------------------------
================================================================================ pgbouncer-1.12.0-5.el8 (FEDORA-EPEL-2020-b464c903b6) Lightweight connection pooler for PostgreSQL -------------------------------------------------------------------------------- Update Information:
Update SPEC file (build & runtime requirements, macros, rpmlint fixes, etc.) & update version for CentOS/RHEL. - Fix dependencies in EPEL 8 - Do not touch in scriptlets or SysV init script (CentOS/RHEL 6) folders and files already part of the package - Permissions on the files already part of the package - SELinux context is wrong i(it's not even in the policy) in the SysV init script and if needed should be managed with semanage fcontext, not in the script. - The daemon runs unconfined, so the file context is useless in the SysV init script - Fix build on RHEL/CentOS 6/7/8. - Do not use a normal home folder and shell for the user. - Do not remove/change files in the scriptlets. - Do not start in daemon mode in systemd units. - Trim changelog. - Add template userlist file. -------------------------------------------------------------------------------- ChangeLog:
* Thu Apr 23 2020 Simone Caronni negativo17@gmail.com - 1.12.0-5 - Change configuration file permissions and also add a template user list. * Wed Apr 15 2020 Simone Caronni negativo17@gmail.com - 1.12.0-4 - Update SPEC file (build & runtime requirements, macros, rpmlint fixes, etc.). - Fix build on RHEL/CentOS 6/7/8. - Do not use a normal home folder and shell for the user. - Do not remove/change files in the scriptlets. - Do not start in daemon mode in systemd units. - Trim changelog. - Merge 1.12.0 from master. --------------------------------------------------------------------------------
================================================================================ pxz-4.999.9-19.beta.20200421git.el8 (FEDORA-EPEL-2020-1205f64d8d) Parallel LZMA compressor using XZ -------------------------------------------------------------------------------- Update Information:
Parallel XZ is a compression utility that takes advantage of running XZ compression simultaneously on different parts of an input file on multiple cores and processors. This significantly speeds up compression time. -------------------------------------------------------------------------------- ChangeLog:
-------------------------------------------------------------------------------- References:
[ 1 ] Bug #1766109 - build of pxz / pixz for EPEL 8 https://bugzilla.redhat.com/show_bug.cgi?id=1766109 --------------------------------------------------------------------------------
================================================================================ tcl-tclxml-3.2-26.el8 (FEDORA-EPEL-2020-ed16eaa86b) XML parsing library for the Tcl scripting language -------------------------------------------------------------------------------- Update Information:
Initial import. -------------------------------------------------------------------------------- ChangeLog:
--------------------------------------------------------------------------------
================================================================================ twa-1.9.1-1.el8 (FEDORA-EPEL-2020-003dc7f2d9) Tiny web auditor with strong opinions -------------------------------------------------------------------------------- Update Information:
Update to latest upstream release (v.1.9.1) -------------------------------------------------------------------------------- ChangeLog:
--------------------------------------------------------------------------------
epel-devel@lists.fedoraproject.org