The following Fedora EPEL 5 Security updates need testing: Age URL 46 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2012-12767/pcp-3.6.6-1.el5 176 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2012-5630/bugzilla-3.2.10-5.el5 5 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2012-13114/phpMyAdmin3-3.5.3-1.el5 71 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2012-6608/Django-1.1.4-2.el5 71 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2012-6588/dokuwiki-0-0.12.20120125.b.el5 3 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2012-13130/drupal7-feeds-2.0-0.5.alpha6.el5 2 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2012-13152/cobbler-2.4.0-beta2.el5 0 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2012-13182/ssmtp-2.61-19.el5
The following builds have been pushed to Fedora EPEL 5 updates-testing jglobus-2.0.4-9.20121013git597e3ac.el5 mozilla-https-everywhere-3.0.1-1.el5 ssmtp-2.61-19.el5 Details about builds: ================================================================================ jglobus-2.0.4-9.20121013git597e3ac.el5 (FEDORA-EPEL-2012-13185) Globus Java client libraries -------------------------------------------------------------------------------- Update Information: Updated version with bugfixes and efficiency improvements. First build for EPEL since there is no longer a spring framework dependency. -------------------------------------------------------------------------------- ================================================================================ mozilla-https-everywhere-3.0.1-1.el5 (FEDORA-EPEL-2012-13174) HTTPS/HSTS enforcement extension for Mozilla Firefox and SeaMonkey -------------------------------------------------------------------------------- Update Information: Update to upstream 3.0.1. remove a lot of off-by-default rulesets due to overhead. Add hundreds of new rulesets. Fix some broken ones. New translations. -------------------------------------------------------------------------------- ChangeLog: * Mon Oct 15 2012 Russell Golden <niveusl...@niveusluna.org> - 3.0.0-1 - Fixes: adition.com, Akamai/SVTplay.se, Bahn.de, European Southern Observatory, IEEE, Indeed, Java, Librivox, Pinterest, New York Times, Springer, Vimeo, Shannon Health, O'Reilly Media https://trac.torproject.org/projects/tor/ticket/7080 https://mail1.eff.org/pipermail/https-everywhere/2012-October/001583.html https://mail1.eff.org/pipermail/https-everywhere-rules/2012-October/001339.html https://mail1.eff.org/pipermail/https-everywhere-rules/2012-October/001343.html - Disable broken: Springer https://mail1.eff.org/pipermail/https-everywhere-rules/2012-October/001340.html - Updated translations: Basque, Hungarian, Traditional Chinese * Fri Oct 12 2012 Russell Golden <niveusl...@niveusluna.org> - 3.0.0-2 - Replace "firefox" in EPEL builds with "firefox >= 3.5" for EL users who think updates are for sissies and/or voiding support contracts with proprietary vendors. They can't use this if their Firefox install is older than 3.5 anyway, so what's the harm? * Tue Oct 9 2012 Russell Golden <niveusl...@niveusluna.org> - 3.0.0-1 - Since version 2.x: - 1,455 new active rulesets - UI improvements: -- right-click to view ruleset source in the config window -- translate some untranslated menus -- better icons in a few places (breaking/redirecting rules, context button) - Numerous improvements to the SSL Observatory internals, including cached submissions on hostile networks, better Tor and Convergence integration, and a new setting to control self-signed cert submission - New translations: Basque, Czech, Danish, French, Greek, Hungarian, Italian, Korean, Malaysian, Polish, Slovak, Turkish, Traditional Chinese - Relative to 3.0development.8: - Only promote the Decentralized SSL Observatory to 5% of non-Tor users - Update the SSL Observatory whitelist of common cert chains - Fixes, mostly in the CDN/media playback department: Akamai/CNN, GO.com/ABC, AWS/Amazon Zeitgeist MP3 player, AWS/Spiegel.tv, Technology Review, Cloudfront/Tunein, Akamai/Discovery Channel, Beyond Security, OCaml, Gentoo, Nokia, Widgetbox.com, Squarespace https://trac.torproject.org/projects/tor/ticket/4199 https://trac.torproject.org/projects/tor/ticket/6871 https://trac.torproject.org/projects/tor/ticket/6992 https://trac.torproject.org/projects/tor/ticket/7000 https://trac.torproject.org/projects/tor/ticket/7020 https://mail1.eff.org/pipermail/https-everywhere-rules/2012-October/001324.html - Disable buggy: Web.de, AJC.com, Feross, Bestofmedia - Remove a lot of off-by-default rulesets from the code, since they have some costs in terms of startup speed and RAM usage -------------------------------------------------------------------------------- ================================================================================ ssmtp-2.61-19.el5 (FEDORA-EPEL-2012-13182) Extremely simple MTA to get mail off the system to a Mailhub -------------------------------------------------------------------------------- Update Information: This version adds to sSMTP the ability to validate the TLS servers it connects to. It also enables use of separate files for client key and certificate files. -------------------------------------------------------------------------------- ChangeLog: * Sun Oct 14 2012 Manuel "lonely wolf" Wolfshant <wo...@fedoraproject.org> - 2.61-19 - Optional separation of TLS client key and certificate files - Add patch enabling verification of TLS server ( #864894 ) - Correct %description and the source in order to reflect that sSMTP expands aliases which are read from a plain text file -------------------------------------------------------------------------------- References: [ 1 ] Bug #864894 - ssmtp: Does not validate server certificates when using TLS connection https://bugzilla.redhat.com/show_bug.cgi?id=864894 -------------------------------------------------------------------------------- _______________________________________________ epel-devel-list mailing list epel-devel-list@redhat.com https://www.redhat.com/mailman/listinfo/epel-devel-list