The following Fedora EPEL 5 Security updates need testing: Age URL 677 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2013-11893 libguestfs-1.20.12-1.el5 442 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2014-1626 puppet-2.7.26-1.el5 291 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2014-3849 sblim-sfcb-1.3.8-2.el5 9 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-7699 drupal6-views_bulk_operations-1.17-1.el5 5 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-7734 drupal7-7.39-1.el5 1 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-7804 drupal6-ctools-1.14-1.el5 0 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-7825 drupal6-6.37-1.el5
The following builds have been pushed to Fedora EPEL 5 updates-testing
drupal6-6.37-1.el5 mozilla-https-everywhere-5.1.0-1.el5
Details about builds:
================================================================================ drupal6-6.37-1.el5 (FEDORA-EPEL-2015-7825) An open-source content-management platform -------------------------------------------------------------------------------- Update Information:
Maintenance and security release of the Drupal 6 series. This release fixes **security vulnerabilities**. Sites are [urged to upgrade immediately](https://www.drupal.org/node/1494290) after reading the notes below and the security announcement: [Drupal Core - Critical - Multiple Vulnerabilities - SA-CORE-2015-003](https://www.drupal.org/SA-CORE-2015-003) No other fixes are included. No changes have been made to the .htaccess, robots.txt or default settings.php files in this release, so upgrading custom versions of those files is not necessary. #### Known issues: None. #### Major changes since 6.36: * For security reasons, the autocomplete system now makes Ajax requests to non-clean URLs only, although protection is also in place for custom code that does so using clean URLs. There is a new form API #process function on autocomplete-enabled text fields that is required for the autocomplete functionality to work; custom and contributed modules should ensure that they are not overriding this #process function accidentally when altering text fields on forms. Part of the security fix also includes changes to theme_textfield(); it is recommended that sites which override this theme function make those changes as well (see the theme_textfield section of this diff for details). * When form API token validation fails (for example, when a cross-site request forgery attempt is detected, or a user tries to submit a form after having logged out and back in again in the meantime), the form API now skips calling form element value callbacks, except for a select list of callbacks provided by Drupal core that are known to be safe. In rare cases, this could lead to data loss when a user submits a form and receives a token validation error, but the overall effect is expected to be minor. -------------------------------------------------------------------------------- References:
[ 1 ] Bug #1255662 - CVE-2015-6658 CVE-2015-6659 CVE-2015-6660 CVE-2015-6661 CVE-2015-6665 drupal: Several issues in 6.x and 7.x (SA-CORE-2015-003) https://bugzilla.redhat.com/show_bug.cgi?id=1255662 --------------------------------------------------------------------------------
================================================================================ mozilla-https-everywhere-5.1.0-1.el5 (FEDORA-EPEL-2015-7816) HTTPS/HSTS enforcement extension for Mozilla Firefox and SeaMonkey -------------------------------------------------------------------------------- Update Information:
mozilla-https-everywhere-5.1.0-1.el5 - Ruleset fixes - AMO signature mozilla-https-everywhere-5.1.0-1.el6 - Ruleset fixes - AMO signature mozilla- https-everywhere-5.1.0-1.el7 - Ruleset fixes - AMO signature --------------------------------------------------------------------------------
epel-devel@lists.fedoraproject.org