The following Fedora EPEL 5 Security updates need testing:
Age URL
822
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2013-11893
libguestfs-1.20.12-1.el5
587
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2014-1626 puppet-2.7.26-1.el5
436
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2014-3849
sblim-sfcb-1.3.8-2.el5
79
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-edbea40516
mcollective-2.8.4-1.el5
51
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-582c8075e6
thttpd-2.25b-24.el5
32
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-d1309b0eb2
libsndfile-1.0.17-8.el5
11
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-512e1f2343
wordpress-4.4.1-1.el5
11
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-7191918aa5
openssl101e-1.0.1e-6.el5
7
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-d4bdacdc4a
prosody-0.9.9-2.el5
7
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-43d6b4225b
mbedtls-2.2.1-1.el5
The following builds have been pushed to Fedora EPEL 5 updates-testing
perl-Crypt-RC4-2.02-1.el5
Details about builds:
================================================================================
perl-Crypt-RC4-2.02-1.el5 (FEDORA-EPEL-2016-70c923f5af)
Perl implementation of the RC4 encryption algorithm
--------------------------------------------------------------------------------
Update Information:
A simple implementation of the RC4 algorithm, developed by RSA Security, Inc.
Here is the description from RSA's website: RC4 is a stream cipher designed by
Rivest for RSA Data Security (now RSA Security). It is a variable key-size
stream cipher with byte-oriented operations. The algorithm is based on the use
of a random permutation. Analysis shows that the period of the cipher is
overwhelmingly likely to be greater than 10100. Eight to sixteen machine
operations are required per output byte, and the cipher can be expected to run
very quickly in software. Independent analysts have scrutinized the algorithm
and it is considered secure.
--------------------------------------------------------------------------------