The following Fedora EPEL 5 Security updates need testing:
 Age  URL
  10  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2013-0148/drupal7-7.19-1.el5
 285  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2012-5630/bugzilla-3.2.10-5.el5
 180  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2012-6608/Django-1.1.4-2.el5
  62  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2012-13612/drupal6-ctools-1.10-1.el5
   8  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2013-0171/moodle-1.9.19-5.el5
   8  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2013-0173/couchdb-1.0.4-2.el5.1
  10  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2013-0116/drupal6-6.28-1.el5
  10  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2013-0139/proftpd-1.3.3g-2.el5
   0  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2013-0237/wordpress-3.5.1-1.el5.1


The following builds have been pushed to Fedora EPEL 5 updates-testing

    drupal7-date_ical-2.3-1.el5
    jglobus-2.0.5-0.1.rc2.el5
    wordpress-3.5.1-1.el5.1

Details about builds:


================================================================================
 drupal7-date_ical-2.3-1.el5 (FEDORA-EPEL-2013-0229)
 Allows creation of an iCal feed in Views
--------------------------------------------------------------------------------
Update Information:

Update to upstream 2.3 release
Update to upstream 2.2 release
--------------------------------------------------------------------------------
ChangeLog:

--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #904736 - drupal7-date_ical-2.3 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=904736
  [ 2 ] Bug #903583 - drupal7-date_ical-2.2 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=903583
--------------------------------------------------------------------------------


================================================================================
 jglobus-2.0.5-0.1.rc2.el5 (FEDORA-EPEL-2013-0236)
 Globus Java client libraries
--------------------------------------------------------------------------------
Update Information:

JGlobus version 2.0.5 release candidate 2.

New packages jglobus-myproxy and jglobus-axisg

--------------------------------------------------------------------------------
ChangeLog:

* Tue Jan 29 2013 Mattias Ellert <mattias.ell...@fysast.uu.se> - 2.0.5-0.1.rc2
- 2.0.5 release candidate 2
- New jglobus-myproxy package
- New jglobus-axisg package
--------------------------------------------------------------------------------


================================================================================
 wordpress-3.5.1-1.el5.1 (FEDORA-EPEL-2013-0237)
 Blog tool and publishing platform
--------------------------------------------------------------------------------
Update Information:

WordPress 3.5.1 is now available. Version 3.5.1 is the first maintenance 
release of 3.5, fixing 37 bugs. It is also a security release for all previous 
WordPress versions. Which include:

* Editor: Prevent certain HTML elements from being unexpectedly removed or 
modified in rare cases.
* Media: Fix a collection of minor workflow and compatibility issues in the new 
media manager.
* Networks: Suggest proper rewrite rules when creating a new network.
* Prevent scheduled posts from being stripped of certain HTML, such as video 
embeds, when they are published.
* Work around some misconfigurations that may have caused some JavaScript in 
the WordPress admin area to fail.
* Suppress some warnings that could occur when a plugin misused the database or 
user APIs.

WordPress 3.5.1 also addresses the following security issues:

* A server-side request forgery vulnerability and remote port scanning using 
pingbacks. This vulnerability, which could potentially be used to expose 
information and compromise a site, affects all previous WordPress versions. 
This was fixed by the WordPress security team. We’d like to thank security 
researchers Gennady Kovshenin and Ryan Dewhurst for reviewing our work.
* Two instances of cross-site scripting via shortcodes and post content. These 
issues were discovered by Jon Cave of the WordPress security team.
* A cross-site scripting vulnerability in the external library Plupload. Thanks 
to the Moxiecode team for working with us on this, and for releasing Plupload 
1.5.5 to address this issue.

--------------------------------------------------------------------------------
ChangeLog:

* Wed Jan 30 2013 Remi Collet <rcol...@redhat.com> - 3.5.1-1.1
- fix simplepie links (for all branches)
* Wed Jan 30 2013 Remi Collet <rcol...@redhat.com> - 3.5.1-1
- version 3.5.1, various bug and security fixes:
  CVE-2013-0235, CVE-2013-0236 and CVE-2013-0237
- drop -f option from rm to break build if
  upstream archive content change
- protect akismet content (from upstream .htaccess)
* Wed Jan  2 2013 Remi Collet <rcol...@redhat.com> - 3.5-3
- fix links to system PHPMailer library
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #904120 - CVE-2013-0235 wordpress: Server-side request forgery and 
remote port scanning using pingbacks
        https://bugzilla.redhat.com/show_bug.cgi?id=904120
  [ 2 ] Bug #904121 - wordpress: XSS flaws via shortcodes and HTTP POST content
        https://bugzilla.redhat.com/show_bug.cgi?id=904121
  [ 3 ] Bug #904122 - wordpress: XSS in the external Plupload library
        https://bugzilla.redhat.com/show_bug.cgi?id=904122
--------------------------------------------------------------------------------


_______________________________________________
epel-devel-list mailing list
epel-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/epel-devel-list

Reply via email to