The following Fedora EPEL 8 Security updates need testing: Age URL 5 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-9d9625a171 libopenmpt-0.7.8-1.el8 1 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-f52b6219ca python39-jinja2-epel-3.1.3-1.2.el8
The following builds have been pushed to Fedora EPEL 8 updates-testing
distribution-gpg-keys-1.104-1.el8 mock-core-configs-40.6-1.el8 python-mmtf-1.1.2-1.el8 unrealircd-6.1.6-1.el8
Details about builds:
================================================================================ distribution-gpg-keys-1.104-1.el8 (FEDORA-EPEL-2024-c21efb44aa) GPG keys of various Linux distributions -------------------------------------------------------------------------------- Update Information:
Automatic update for distribution-gpg-keys-1.104-1.el8. Changelog for distribution-gpg-keys * Wed Jun 12 2024 Miroslav Such�� msuchy@redhat.com 1.104-1 - update copr keys - Add RPM-GPG-KEY-CentOS-Official-SHA256 * Mon Jun 03 2024 Miroslav Such�� msuchy@redhat.com 1.103-1 - update copr keys - add FFmpeg, LibreWolf, Monero, VideoLAN, and yt-dlp keys - Add CentOS 10 and EPEL 10 GPG keys - add Alpine Linux and postmarketOS keys -------------------------------------------------------------------------------- ChangeLog:
* Wed Jun 12 2024 Miroslav Such�� msuchy@redhat.com 1.104-1 - update copr keys - Add RPM-GPG-KEY-CentOS-Official-SHA256 * Mon Jun 3 2024 Miroslav Such�� msuchy@redhat.com 1.103-1 - update copr keys - add FFmpeg, LibreWolf, Monero, VideoLAN, and yt-dlp keys - Add CentOS 10 and EPEL 10 GPG keys - add Alpine Linux and postmarketOS keys --------------------------------------------------------------------------------
================================================================================ mock-core-configs-40.6-1.el8 (FEDORA-EPEL-2024-c21efb44aa) Mock core config files basic chroots -------------------------------------------------------------------------------- Update Information:
Automatic update for distribution-gpg-keys-1.104-1.el8. Changelog for distribution-gpg-keys * Wed Jun 12 2024 Miroslav Such�� msuchy@redhat.com 1.104-1 - update copr keys - Add RPM-GPG-KEY-CentOS-Official-SHA256 * Mon Jun 03 2024 Miroslav Such�� msuchy@redhat.com 1.103-1 - update copr keys - add FFmpeg, LibreWolf, Monero, VideoLAN, and yt-dlp keys - Add CentOS 10 and EPEL 10 GPG keys - add Alpine Linux and postmarketOS keys -------------------------------------------------------------------------------- ChangeLog:
* Sat Jun 15 2024 Pavel Raiskup praiskup@redhat.com 40.6-1 - c10s config use mirrored metalinks --------------------------------------------------------------------------------
================================================================================ python-mmtf-1.1.2-1.el8 (FEDORA-EPEL-2024-cc66ca2190) A decoding library for the macromolecular transmission format (MMTF) -------------------------------------------------------------------------------- Update Information:
Bump epoch to downgrade to 1.1.2 (fixes rhbz#2291167) -------------------------------------------------------------------------------- ChangeLog:
* Sat Jun 15 2024 Tim Semeijn tim@goat.re - 1:1.1.2-1 - Bump epoch to downgrade to 1.1.2 (fixes rhbz#2291167) -------------------------------------------------------------------------------- References:
[ 1 ] Bug #2291167 - python3-mmtf 1.1.3 has dependency on python3-msgpack >= 1.0.0 which is not available in EPEL8 https://bugzilla.redhat.com/show_bug.cgi?id=2291167 --------------------------------------------------------------------------------
================================================================================ unrealircd-6.1.6-1.el8 (FEDORA-EPEL-2024-8a4b5cc99e) Open Source IRC server -------------------------------------------------------------------------------- Update Information:
UnrealIRCd 6.1.6 This is mostly a bug fix release but also comes with Crule enhancements. UnrealIRCd turned 25 a few weeks ago! ���� See UnrealIRCd celebrates its 25th birthday. Enhancements: Crule functions can now do everything that security group blocks can do. In practice, this means the following functions were added in this release: is_tls() returns true if the client is using SSL/TLS in_security_group('known-users') returns true if the user is in the specified security group. match_mask('*@*.example.org') or match_mask('*.example.org') returns true if client matches mask. match_ip('192.168.*') or with CIDR like match_ip('192.168.0.0/16') returns true if IP address of client matches. is_identified() which returns true if the client is identified to a services account. is_webirc() which returns true if the client is connected using WEBIRC. is_websocket() which returns true if the client is connected using WebSockets. match_realname('*xyz*') which returns true if the real name (gecos) contains xyz. match_account('xyz') which returns true if the services account name is xyz. match_country('NL') which returns true if GeoIP determined the country to be NL. match_certfp('abc') which returns true if the Certificate fingerprint is abc. Changes For many years REHASH -all is the same as REHASH so we now reject the former. The Crule function inchannel('#xyz') is now called in_channel('#xyz') to match the naming style of the other functions. The old name will keep working for the entire UnrealIRCd 6 series too. Fixes Crash if you first REHASH and have a parse error (failed rehash 1) and then REHASH again but have a "late" rehash error, such as a remote include failing to load (failed rehash 2). Conditional config: using @if with a variable like @if $VAR == "something" always evaluated to false. A ~forward ban did not check ban exemptions (+e), always forwarding the user. When booting for the first time (without any cached files) the IRCd downloads GeoIP.dat. If that fails, e.g. due to lack of internet connectivity, we now show a warning and continue booting instead of it being a hard error. Note that we already dealt with this properly after the file has been cached (so after first download), see "What if your web server is down" in Remote includes. Removed The tls-and-known-users security group was confusing, in the sense that this group consisted of tls-users and of known-users (in an OR fashion, not AND). Since this group is rarely used it has now been removed altogether. If you used it in your configuration then you can still manually (re)create the security group with: security-group tls-and-known-users { identified yes; reputation-score 25; tls yes; } Developers and protocol Modules can now provide SASL locally, see Dev:Authentication module. -------------------------------------------------------------------------------- ChangeLog:
* Sat Jun 15 2024 Robert Scheck robert@fedoraproject.org 6.1.6-1 - Upgrade to 6.1.6 (#2290902) -------------------------------------------------------------------------------- References:
[ 1 ] Bug #2290902 - unrealircd-6.1.6 is available https://bugzilla.redhat.com/show_bug.cgi?id=2290902 --------------------------------------------------------------------------------
epel-devel@lists.fedoraproject.org