The following Fedora EPEL 5 Security updates need testing:
Age URL
1115
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2012-5630/bugzilla-3....
569
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2013-11893/libguestfs...
334
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1626/puppet-2.7....
183
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3849/sblim-sfcb-...
11
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2015-6090/drupal7-vie...
5
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2015-6130/t1utils-1.3...
3
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2015-5953/wordpress-4...
0
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2015-6127/openslp-1.2...
The following builds have been pushed to Fedora EPEL 5 updates-testing
opendkim-2.10.2-1.el5
openslp-1.2.1-22.el5
Details about builds:
================================================================================
opendkim-2.10.2-1.el5 (FEDORA-EPEL-2015-6241)
A DomainKeys Identified Mail (DKIM) milter to sign and/or verify mail
--------------------------------------------------------------------------------
Update Information:
- Updated to use newer upstream 2.10.2 source code
- Removed patches for bugs fixed in upstream source
- Included support for systemd macros
- Added deprecated options notice to default configuration file
- Added new options to default configuration file
- Updated README.fedora with additional SQL useage info
--------------------------------------------------------------------------------
ChangeLog:
* Mon May 11 2015 Steve Jenkins <steve(a)stevejenkins.com> - 2.10.2-1
- Updated to use newer upstream 2.10.2 source code
- Removed patches for bugs fixed in upstream source
- Included support for systemd macros
- Added deprecated options notice to default configuration file
- Added new options to default configuration file
- Updated README.fedora with additional SQL useage info
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1220390 - opendkim-2.10.2 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1220390
--------------------------------------------------------------------------------
================================================================================
openslp-1.2.1-22.el5 (FEDORA-EPEL-2015-6127)
Open implementation of Service Location Protocol V2
--------------------------------------------------------------------------------
Update Information:
openslp: denial of service vulnerability (CVE-2010-3609)
--------------------------------------------------------------------------------
ChangeLog:
* Mon May 11 2015 Rex Dieter <rdieter(a)fedoraproject.org> 1.2.1-22
- openslp: out-of-bounds read in SLPIntersectStringList() can cause DoS (CVE-2012-4428,
#857242)
* Mon May 4 2015 Rex Dieter <rdieter(a)fedoraproject.org> 1.2.1-21
- openslp: denial of service vulnerability (CVE-2010-3609, #684294)
* Sat Aug 3 2013 Fedora Release Engineering <rel-eng(a)lists.fedoraproject.org> -
1.2.1-20
- Rebuilt for
https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
* Wed Jun 19 2013 Rex Dieter <rdieter(a)fedoraproject.org> 1.2.1-19
- -server: Requires: +net-tools (for netstat, #975868)
* Wed Jan 30 2013 Rex Dieter <rdieter(a)fedoraproject.org> 1.2.1-18
- update URL: tag (#905975)
* Fri Jul 20 2012 Fedora Release Engineering <rel-eng(a)lists.fedoraproject.org> -
1.2.1-17
- Rebuilt for
https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
* Fri Jan 13 2012 Fedora Release Engineering <rel-eng(a)lists.fedoraproject.org> -
1.2.1-16
- Rebuilt for
https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild
* Tue Feb 8 2011 Fedora Release Engineering <rel-eng(a)lists.fedoraproject.org> -
1.2.1-15
- Rebuilt for
https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #684294 - CVE-2010-3609 openslp: denial of service vulnerability
https://bugzilla.redhat.com/show_bug.cgi?id=684294
[ 2 ] Bug #857242 - CVE-2012-4428 openslp: out-of-bounds read in
SLPIntersectStringList() can cause DoS
https://bugzilla.redhat.com/show_bug.cgi?id=857242
--------------------------------------------------------------------------------