The following Fedora EPEL 6 Security updates need testing:
 Age  URL
   1  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-5f91ab971e   
wordpress-5.1.6-1.el6


The following builds have been pushed to Fedora EPEL 6 updates-testing

    php-horde-horde-5.2.23-1.el6
    tcpreplay-4.3.3-1.el6

Details about builds:


================================================================================
 php-horde-horde-5.2.23-1.el6 (FEDORA-EPEL-2020-e982b1bb7c)
 Horde Application Framework
--------------------------------------------------------------------------------
Update Information:

**horde 5.2.23**  * [mjr] SECURITY: Fix javascript injection vulnerability in
mobile login page. * [mjr] Fix broken cloud search in portal block.
--------------------------------------------------------------------------------
ChangeLog:

* Mon Jun 15 2020 Remi Collet <r...@remirepo.net> - 5.2.23-1
- update to 5.2.23
--------------------------------------------------------------------------------


================================================================================
 tcpreplay-4.3.3-1.el6 (FEDORA-EPEL-2020-be517af396)
 Replay captured network traffic
--------------------------------------------------------------------------------
Update Information:

This release contains bug fixes only (which includes security fixes):  -
Increase cache buffers size to accomodate VLAN edits (#594) - Correct L2 header
length to correct IP header offset (#583) - Fix warnings from gcc version 10
(#580) - Heap Buffer Overflow in randomize_iparp (#579) - Use after free in
get_ipv6_next (#578) - Heap Buffer Overflow in git_ipv6_next (#576) - Call
pcap_freecode() on pcap_compile() (#572) - Increase max snaplen to 262144 (#571)
- Fix divide by zero in fuzzing (#570) - Unique IP repeats at very high
iteration counts (#566) - Fails to compile on FreeBSD amd64 13.0 (#558) - Heap
Buffer Overflow in do_checksum (#556) (#577) - Attempt to correct corrupt pcap
files, if possible (#557) - Fix GCC v10 warnings (#555) - Remove some duplicated
SOURCES entries (#551) - Expand /dev/bpfX hard limit to fix macOS Mojave (#550)
- Implement --loopdelay-ms when using --loop=0 (#546) - Heap overflow
packet2tree and get_l2len (#530)
--------------------------------------------------------------------------------
ChangeLog:

* Mon Jun 15 2020 Bojan Smojver <bojan@rexursive com> - 4.3.3-1
- bump up to 4.3.3
- CVE-2020-12740
* Fri Jan 31 2020 Fedora Release Engineering <rel...@fedoraproject.org> - 
4.3.2-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
* Sat Jul 27 2019 Fedora Release Engineering <rel...@fedoraproject.org> - 
4.3.2-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1678246 - CVE-2019-8377 tcpreplay: null pointer dereference in 
function get_ipv6_l4proto() in get.c [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1678246
  [ 2 ] Bug #1835343 - CVE-2020-12740 tcpreplay: Heap-based buffer over-read in 
function get_ipv6_next() at common/get.c [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1835343
--------------------------------------------------------------------------------

_______________________________________________
epel-devel mailing list -- epel-de...@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-de...@lists.fedoraproject.org

Reply via email to