The following Fedora EPEL 5 Security updates need testing:
 Age  URL
 1051  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2012-5630/bugzilla-3.2.10-5.el5
 505  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2013-11893/libguestfs-1.20.12-1.el5
 269  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1626/puppet-2.7.26-1.el5
 123  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3784/mantis-1.2.17-3.el5
 119  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3849/sblim-sfcb-1.3.8-2.el5
  28  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2015-0695/drupal7-path_breadcrumbs-3.2-1.el5
   9  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2015-1001/drupal7-entity-1.6-1.el5
   0  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2015-1098/librsync-1.0.0-1.el5,duplicity-0.6.21-2.el5,rdiff-backup-1.0.5-3.el5
   0  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2015-1121/dokuwiki-0-0.24.20140929c.el5
   0  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2015-1044/putty-0.63-4.el5
   0  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2015-1029/phpMyAdmin4-4.0.10.9-1.el5


The following builds have been pushed to Fedora EPEL 5 updates-testing

    HepMC-2.06.09-9.el5
    R-qtl-1.36.6-1.el5
    dokuwiki-0-0.24.20140929c.el5
    drupal7-features-2.4-1.el5
    drupal7-token-1.6-1.el5
    duplicity-0.6.21-2.el5
    fedpkg-minimal-1.0.0-3.el5
    fts-3.2.32-1.el5
    gfal2-2.8.4-1.el5
    globus-ftp-client-8.20-1.el5
    lhapdf-5.9.1-9.el5
    librsync-1.0.0-1.el5
    munin-2.0.25-2.el5
    opendkim-2.10.1-2.el5
    opendmarc-1.3.1-3.el5
    pcp-3.10.3-1.el5
    phpMyAdmin4-4.0.10.9-1.el5
    putty-0.63-4.el5
    rdiff-backup-1.0.5-3.el5
    root-5.34.26-1.el5
    srm-ifce-1.22.2-1.el5
    udt-4.11-4.el5
    userspace-rcu-0.7.7-1.el5

Details about builds:


================================================================================
 HepMC-2.06.09-9.el5 (FEDORA-EPEL-2015-1032)
 C++ Event Record for Monte Carlo Generators
--------------------------------------------------------------------------------
Update Information:

Avoid hexfloat notation (gcc 5), Use greater allowed epsilon for test (fixes 
i686 build).
--------------------------------------------------------------------------------
ChangeLog:

* Fri Mar  6 2015 Mattias Ellert <[email protected]> - 2.06.09-9
- Increase epsilon - for i686 Fedora 22+ tests
* Fri Mar  6 2015 Mattias Ellert <[email protected]> - 2.06.09-8
- Do not trigger hexfloat output with gcc 5
* Fri Aug 15 2014 Fedora Release Engineering <[email protected]> 
- 2.06.09-7
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
* Fri Jun  6 2014 Fedora Release Engineering <[email protected]> 
- 2.06.09-6
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Thu Aug  8 2013 Mattias Ellert <[email protected]> - 2.06.09-5
- Use _pkgdocdir
* Fri Aug  2 2013 Fedora Release Engineering <[email protected]> 
- 2.06.09-4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
--------------------------------------------------------------------------------


================================================================================
 R-qtl-1.36.6-1.el5 (FEDORA-EPEL-2015-1131)
 Tools for analyzing QTL experiments
--------------------------------------------------------------------------------
Update Information:

Version 1.36, 2015-03-05

Major changes:
* None.

Minor changes:
* Added a function flip.order() for flipping the order of markers on selected 
chromosomes.
* Added scanonevar.meanperm and scanonevar.varperm (from Robert Corty) for 
permutation tests with scanonevar().
* Revised plotPheno (aka plot.pheno) so that one can control the x-axis label 
and title (also, in a histogram, the breaks).
* plotPXG: if infer=FALSE and there are no fully-informative genotypes (e.g., 
in a 4-way cross), give a more informative error.
* geno.image: allow control of x- and y-axis labels; allow suppression of axes.
* Removed some warnings about missing end-of-line characters, in read.cross 
with MapQTL format.
* Fixed a bug in scanonevar; was failing with an error about coercing class "A" 
to a data.frame
* Dropped the name summary.scantwo.old(); still available as 
summaryScantwoOld().

--------------------------------------------------------------------------------
ChangeLog:

* Fri Mar  6 2015 Mattias Ellert <[email protected]> - 1.36.6-1
- Update to 1.36.6
--------------------------------------------------------------------------------


================================================================================
 dokuwiki-0-0.24.20140929c.el5 (FEDORA-EPEL-2015-1121)
 Standards compliant simple to use wiki
--------------------------------------------------------------------------------
Update Information:

This update fixes CVE-2015-2172

* There's a security hole in the ACL plugins remote API component. The plugin 
failes to check for superuser permissions before executing ACL addition or 
deletion. This means everybody with permissions to call the XMLRPC API also has 
permissions to set up their own ACL rules and thus circumventing any existing 
rules.
Update to the 2014-09-29b release which contains various fixes, notably:

Security:
* CVE-2014-9253 - XSS via SFW file upload
* CVE-2012-6662 - jquery-ui XSS vulnerability

Bugfixes:
* dokuwiki requires php-xml (RHBZ#1061477)
* wrong SELinux file context for writable files/directories (RHBZ#1064524)
* drop httpd requirement (RHBZ#1164396)

Update to the 2014-09-29b release which contains various fixes, notably:

Security:
* CVE-2014-9253 - XSS via SFW file upload
* CVE-2012-6662 - jquery-ui XSS vulnerability

Bugfixes:
* dokuwiki requires php-xml (RHBZ#1061477)
* wrong SELinux file context for writable files/directories (RHBZ#1064524)
* drop httpd requirement (RHBZ#1164396)

Update to the 2014-09-29b release which contains various fixes, notably:

Security:
* CVE-2014-9253 - XSS via SFW file upload
* CVE-2012-6662 - jquery-ui XSS vulnerability

Bugfixes:
* dokuwiki requires php-xml (RHBZ#1061477)
* wrong SELinux file context for writable files/directories (RHBZ#1064524)
* drop httpd requirement (RHBZ#1164396)

Update to the 2014-09-29b release which contains various fixes, notably:

Security:
* CVE-2014-9253 - XSS via SFW file upload
* CVE-2012-6662 - jquery-ui XSS vulnerability

Bugfixes:
* dokuwiki requires php-xml (RHBZ#1061477)
* wrong SELinux file context for writable files/directories (RHBZ#1064524)
* drop httpd requirement (RHBZ#1164396)

This update adds dokuwiki package to EPEL7
--------------------------------------------------------------------------------
ChangeLog:

* Tue Mar  3 2015 Adam Tkac <[email protected]> - 0.0.24.20140929c
- update to the latest upstream (CVE-2015-2172)
* Fri Dec 26 2014 Adam Tkac <[email protected]> - 0.0.23.20140929b
- update to the latest upstream
- drop requirement of httpd (#1164396)
- fix SELinux file contexts (#1064524)
- require php-xml (#1061477)
* Sat Jun  7 2014 Fedora Release Engineering <[email protected]> 
- 0-0.22.20131208
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1197822 - CVE-2015-2172 dokuwiki: privilege escalation in RPC API
        https://bugzilla.redhat.com/show_bug.cgi?id=1197822
--------------------------------------------------------------------------------


================================================================================
 drupal7-features-2.4-1.el5 (FEDORA-EPEL-2015-1119)
 Provides feature management for Drupal
--------------------------------------------------------------------------------
Update Information:

Update to upstream 2.4 release for bug fixes
--------------------------------------------------------------------------------
ChangeLog:

* Thu Mar  5 2015 Jared Smith <[email protected]> - 2.4-1
- Update to upstream 2.4 release for bug fixes
- Upstream changelog for this release: https://www.drupal.org/node/2446159
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1199065 - drupal7-features-2.4 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=1199065
--------------------------------------------------------------------------------


================================================================================
 drupal7-token-1.6-1.el5 (FEDORA-EPEL-2015-1144)
 Provides a user interface for the Token API and some missing core tokens
--------------------------------------------------------------------------------
Update Information:

Fixes bugs in the Token module. For complete details, refer to: 
https://www.drupal.org/node/2443407
--------------------------------------------------------------------------------
ChangeLog:

* Mon Mar  2 2015 Paul W. Frields <[email protected]> - 1.6-1
- New upstream version.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1197526 - drupal7-token-1.6 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=1197526
--------------------------------------------------------------------------------


================================================================================
 duplicity-0.6.21-2.el5 (FEDORA-EPEL-2015-1098)
 Encrypted bandwidth-efficient backup using rsync algorithm
--------------------------------------------------------------------------------
Update Information:

Changes in librsync 1.0.0 (2015-01-23)
======================================

  * SECURITY: CVE-2014-8242: librsync previously used a truncated MD4 "strong" 
check sum to match blocks. However, MD4 is not cryptographically strong. It's 
possible that an attacker who can control the contents of one part of a file 
could use it to control other regions of the file, if it's transferred using 
librsync/rdiff. For example this might occur in a database, mailbox, or VM 
image containing some attacker-controlled data. To mitigate this issue, 
signatures will by default be computed with a 256-bit BLAKE2 hash. Old versions 
of librsync will complain about a bad magic number when given these signature 
files. Backward compatibility can be obtained using the new `rdiff sig 
--hash=md4` option or through specifying the "signature magic" in the API, but 
this should not be used when either the old or new file contain untrusted data. 
Deltas generated from those signatures will also use BLAKE2 during generation, 
but produce output that can be read by old versions. See 
https://github.com/librsync/librsync/issues/5. Thanks to Michael Samuel 
<miknet.net> for reporting this and offering an initial patch.
  * Various build fixes, thanks Timothy Gu.
  * Improved rdiff man page from Debian.
  * Improved librsync.spec file for building RPMs.
  * Fixed bug #1110812 'internal error: job made no progress'; on large files.
  * Moved hosting to https://github.com/librsync/librsync/
  * Travis-CI.org integration test at https://travis-ci.org/librsync/librsync/
  * Remove bundled copy of popt; it must be installed separately.
  * You can set `$LIBTOOLIZE` before running `autogen.sh`, for example on OS X 
Homebrew where it is called `glibtoolize`.
--------------------------------------------------------------------------------
ChangeLog:

* Sat Mar  7 2015 Robert Scheck <[email protected]> - 0.6.21-2
- Rebuild for librsync 1.0.0 (#1126712)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1126712 - CVE-2014-8242 librsync: MD4 collision file corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=1126712
--------------------------------------------------------------------------------


================================================================================
 fedpkg-minimal-1.0.0-3.el5 (FEDORA-EPEL-2015-1099)
 Script to allow fedpkg fetch to work
--------------------------------------------------------------------------------
Update Information:

fedpkg replacement for use in Fedora buildsystem buildroots
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1189611 - Review Request: fedpkg-minimal - Script to allow fedpkg 
fetch to work
        https://bugzilla.redhat.com/show_bug.cgi?id=1189611
--------------------------------------------------------------------------------


================================================================================
 fts-3.2.32-1.el5 (FEDORA-EPEL-2015-1058)
 File Transfer Service V3
--------------------------------------------------------------------------------
Update Information:

fts 3.2.32 release
--------------------------------------------------------------------------------
ChangeLog:

* Thu Mar  5 2015 Alejandro Alvarez Ayllon <[email protected]> - 3.2.32-1
- Update for new upstream release
--------------------------------------------------------------------------------


================================================================================
 gfal2-2.8.4-1.el5 (FEDORA-EPEL-2015-1053)
 Grid file access library 2.0
--------------------------------------------------------------------------------
Update Information:

Update for release of gfal2 2.8.4
--------------------------------------------------------------------------------
ChangeLog:

* Mon Mar  2 2015 Alejandro Alvarez Ayllon <aalvarez at cern.ch> - 2.8.4-1
- Upgraded to upstream release 2.8.4
--------------------------------------------------------------------------------


================================================================================
 globus-ftp-client-8.20-1.el5 (FEDORA-EPEL-2015-1071)
 Globus Toolkit - GridFTP Client Library
--------------------------------------------------------------------------------
Update Information:

Improved fix for GGUS 109089/109576 (from upstream git)

--------------------------------------------------------------------------------
ChangeLog:

* Fri Mar  6 2015 Mattias Ellert <[email protected]> - 8.20-1
- GT6 update (upstream's release of previous fix)
* Thu Mar  5 2015 Mattias Ellert <[email protected]> - 8.19-2
- Improved fix for GGUS 109089/109576 (from upstream git)
--------------------------------------------------------------------------------


================================================================================
 lhapdf-5.9.1-9.el5 (FEDORA-EPEL-2015-1048)
 Les Houches Accord PDF Interface
--------------------------------------------------------------------------------
Update Information:

Fix to example code.
--------------------------------------------------------------------------------
ChangeLog:

* Sat Mar  7 2015 Mattias Ellert <[email protected]> - 5.9.1-9
- Fix lhacontrol common block in example
* Sun Oct 12 2014 Mattias Ellert <[email protected]> - 5.9.1-8
- Re-enable octave for EPEL 7
* Sun Aug 17 2014 Fedora Release Engineering <[email protected]> 
- 5.9.1-7
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
* Sat Jun  7 2014 Fedora Release Engineering <[email protected]> 
- 5.9.1-6
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Tue Jun  3 2014 Mattias Ellert <[email protected]> - 5.9.1-5
- Disable octave for EPEL 7 - not yet available
--------------------------------------------------------------------------------


================================================================================
 librsync-1.0.0-1.el5 (FEDORA-EPEL-2015-1098)
 Rsync libraries
--------------------------------------------------------------------------------
Update Information:

Changes in librsync 1.0.0 (2015-01-23)
======================================

  * SECURITY: CVE-2014-8242: librsync previously used a truncated MD4 "strong" 
check sum to match blocks. However, MD4 is not cryptographically strong. It's 
possible that an attacker who can control the contents of one part of a file 
could use it to control other regions of the file, if it's transferred using 
librsync/rdiff. For example this might occur in a database, mailbox, or VM 
image containing some attacker-controlled data. To mitigate this issue, 
signatures will by default be computed with a 256-bit BLAKE2 hash. Old versions 
of librsync will complain about a bad magic number when given these signature 
files. Backward compatibility can be obtained using the new `rdiff sig 
--hash=md4` option or through specifying the "signature magic" in the API, but 
this should not be used when either the old or new file contain untrusted data. 
Deltas generated from those signatures will also use BLAKE2 during generation, 
but produce output that can be read by old versions. See 
https://github.com/librsync/librsync/issues/5. Thanks to Michael Samuel 
<miknet.net> for reporting this and offering an initial patch.
  * Various build fixes, thanks Timothy Gu.
  * Improved rdiff man page from Debian.
  * Improved librsync.spec file for building RPMs.
  * Fixed bug #1110812 'internal error: job made no progress'; on large files.
  * Moved hosting to https://github.com/librsync/librsync/
  * Travis-CI.org integration test at https://travis-ci.org/librsync/librsync/
  * Remove bundled copy of popt; it must be installed separately.
  * You can set `$LIBTOOLIZE` before running `autogen.sh`, for example on OS X 
Homebrew where it is called `glibtoolize`.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1126712 - CVE-2014-8242 librsync: MD4 collision file corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=1126712
--------------------------------------------------------------------------------


================================================================================
 munin-2.0.25-2.el5 (FEDORA-EPEL-2015-1042)
 Network-wide graphing framework (grapher/gatherer)
--------------------------------------------------------------------------------
Update Information:

Merge 2.1 paches back to 2.0
--------------------------------------------------------------------------------
ChangeLog:

* Sat Mar  7 2015 "D. Johnson" <[email protected]> - 2.0.25-2
- Merge 2.1 paches back to 2.0
- BZ# 1149949 - munin-async init script to override defaults (PR-274 backport)
- BZ# 1049262 - munin ntp_ plugin uses perl features from perl 5.10.0 but can 
only use perl 5.8.8
- BZ# 1140015 - Munin mysql plugin fails to parse MariaDB status
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1149949 - munin-async init script to override defaults
        https://bugzilla.redhat.com/show_bug.cgi?id=1149949
  [ 2 ] Bug #1049262 - munin ntp_ plugin uses perl features from perl 5.10.0 
but can only use perl 5.8.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1049262
  [ 3 ] Bug #1140015 - Munin mysql plugin fails to parse MariaDB status
        https://bugzilla.redhat.com/show_bug.cgi?id=1140015
--------------------------------------------------------------------------------


================================================================================
 opendkim-2.10.1-2.el5 (FEDORA-EPEL-2015-1138)
 A DomainKeys Identified Mail (DKIM) milter to sign and/or verify mail
--------------------------------------------------------------------------------
Update Information:

Updating to 2.10.1 source (bug #1178373) and adding IPv6 localhost (::1) to 
default TrustedHosts file (bug #1049204).
Updating to 2.10.1 upstream source, addition of README.fedora file, and various 
bug fixes.
Updating to 2.9.2-2

This build is primarily to address SELinux issues, and no longer auto-creates 
default keys on startup.

Privileged user must now generate keys after install, so they can be owned by 
root.
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to 2.9.2-2

This build is primarily to address SELinux issues, and no longer auto-creates 
default keys on startup.

Privileged user must now generate keys after install, so they can be owned by 
root.
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to 2.9.2-2

This build is primarily to address SELinux issues, and no longer auto-creates 
default keys on startup.

Privileged user must now generate keys after install, so they can be owned by 
root.
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to 2.10.1 upstream source, addition of README.fedora file, and various 
bug fixes.
Updating to 2.9.2-2

This build is primarily to address SELinux issues, and no longer auto-creates 
default keys on startup.

Privileged user must now generate keys after install, so they can be owned by 
root.
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to 2.9.2-2

This build is primarily to address SELinux issues, and no longer auto-creates 
default keys on startup.

Privileged user must now generate keys after install, so they can be owned by 
root.
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to 2.9.2-2

This build is primarily to address SELinux issues, and no longer auto-creates 
default keys on startup.

Privileged user must now generate keys after install, so they can be owned by 
root.
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to 2.10.1 upstream source, addition of README.fedora file, and various 
bug fixes.
Updating to 2.9.2-2

This build is primarily to address SELinux issues, and no longer auto-creates 
default keys on startup.

Privileged user must now generate keys after install, so they can be owned by 
root.
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to 2.9.2-2

This build is primarily to address SELinux issues, and no longer auto-creates 
default keys on startup.

Privileged user must now generate keys after install, so they can be owned by 
root.
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to 2.9.2-2

This build is primarily to address SELinux issues, and no longer auto-creates 
default keys on startup.

Privileged user must now generate keys after install, so they can be owned by 
root.
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to 2.10.1 upstream source, addition of README.fedora file, and various 
bug fixes.
Updating to 2.9.2-2

This build is primarily to address SELinux issues, and no longer auto-creates 
default keys on startup.

Privileged user must now generate keys after install, so they can be owned by 
root.
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to 2.9.2-2

This build is primarily to address SELinux issues, and no longer auto-creates 
default keys on startup.

Privileged user must now generate keys after install, so they can be owned by 
root.
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to 2.9.2-2

This build is primarily to address SELinux issues, and no longer auto-creates 
default keys on startup.

Privileged user must now generate keys after install, so they can be owned by 
root.
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to 2.10.1 upstream source, addition of README.fedora file, and various 
bug fixes.
Updating to 2.9.2-2

This build is primarily to address SELinux issues, and no longer auto-creates 
default keys on startup.

Privileged user must now generate keys after install, so they can be owned by 
root.
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to 2.9.2-2

This build is primarily to address SELinux issues, and no longer auto-creates 
default keys on startup.

Privileged user must now generate keys after install, so they can be owned by 
root.
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to 2.9.2-2

This build is primarily to address SELinux issues, and no longer auto-creates 
default keys on startup.

Privileged user must now generate keys after install, so they can be owned by 
root.
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to 2.10.1 upstream source, addition of README.fedora file, and various 
bug fixes.
Updating to 2.9.2-2

This build is primarily to address SELinux issues, and no longer auto-creates 
default keys on startup.

Privileged user must now generate keys after install, so they can be owned by 
root.
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to 2.9.2-2

This build is primarily to address SELinux issues, and no longer auto-creates 
default keys on startup.

Privileged user must now generate keys after install, so they can be owned by 
root.
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to 2.9.2-2

This build is primarily to address SELinux issues, and no longer auto-creates 
default keys on startup.

Privileged user must now generate keys after install, so they can be owned by 
root.
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
Updating to newer upstream source: 2.9.2
--------------------------------------------------------------------------------
ChangeLog:

* Tue Mar  3 2015 Steve Jenkins <[email protected]> - 2.10.1-2
- Added IPv6 ::1 support to TrustedHosts (RH Bugzilla #1049204)
* Tue Mar  3 2015 Steve Jenkins <[email protected]> - 2.10.1-1
- Updated to use newer upstream 2.10.1 source code
* Tue Dec  9 2014 Steve Jenkins <[email protected]> - 2.10.0-1
- Updated to use newer upstream 2.10.0 source code
- Removed unbound compile option due to orphaned upstream dependency
- Removed AUTOCREATE_DKIM_KEYS option
- Added README.fedora with basic key generation and config instructions
* Sun Aug 17 2014 Fedora Release Engineering <[email protected]> 
- 2.9.2-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
* Mon Aug  4 2014 Steve Jenkins <[email protected]> - 2.9.2-2
- Change file ownerships/permissions to fix 
https://bugzilla.redhat.com/show_bug.cgi?id=891292
- Default keys no longer created on startup. Privileged user must run 
opendkim-default-keygen or create manually (after install)
* Wed Jul 30 2014 Steve Jenkins <[email protected]> - 2.9.2-1
- Updated to use newer upstream 2.9.2 source code
- Fixed invalid date in changelog
* Sat Jun  7 2014 Fedora Release Engineering <[email protected]> 
- 2.9.0-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #973541 - opendkim-2.9.2 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=973541
  [ 2 ] Bug #1178373 - opendkim-2.10.1 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=1178373
  [ 3 ] Bug #1049204 - TrustedHosts is missing IPv6 ::1
        https://bugzilla.redhat.com/show_bug.cgi?id=1049204
  [ 4 ] Bug #891292 - SELinux is preventing /usr/sbin/opendkim from using the 
dac_override capability
        https://bugzilla.redhat.com/show_bug.cgi?id=891292
--------------------------------------------------------------------------------


================================================================================
 opendmarc-1.3.1-3.el5 (FEDORA-EPEL-2015-1109)
 A Domain-based Message Authentication, Reporting & Conformance (DMARC) milter 
and library
--------------------------------------------------------------------------------
Update Information:

* Fri Mar 06 2015 Steve Jenkins <[email protected]> 1.3.1-3
- Added libbsd and libbsd-devel build requirement to fix libstrl issue
- initial packaged version of OpenDMARC for Fedora-based systems
- initial packaged version of OpenDMARC for Fedora-based systems
- initial packaged version of OpenDMARC for Fedora-based systems
- initial packaged version of OpenDMARC for Fedora-based systems
- initial packaged version of OpenDMARC for Fedora-based systems
- initial packaged version of OpenDMARC for Fedora-based systems
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #905304 - Review Request: OpenDMARC - Domain-based Message 
Authentication, Reporting & Conformance (DMARC) milter and library
        https://bugzilla.redhat.com/show_bug.cgi?id=905304
--------------------------------------------------------------------------------


================================================================================
 pcp-3.10.3-1.el5 (FEDORA-EPEL-2015-1113)
 System-level performance monitoring and performance management
--------------------------------------------------------------------------------
Update Information:

Update to latest PCP sources, New sub-package for pcp-import-ganglia2pcp, 
Python3 support
--------------------------------------------------------------------------------
ChangeLog:

* Mon Mar  2 2015 Dave Brolley <[email protected]> - 3.10.3-1
- Update to latest PCP sources.
- New sub-package for pcp-import-ganglia2pcp.
- Python3 support, enabled by default in f22 onward (BZ 1194324)
* Mon Feb 23 2015 Slavek Kabrda <[email protected]> - 3.10.2-3
- Only use Python 3 in Fedora >= 23, more info at
  https://bugzilla.redhat.com/show_bug.cgi?id=1194324#c4
* Mon Feb 23 2015 Nathan Scott <[email protected]> - 3.10.2-2
- Initial changes to support python3 as default (BZ 1194324)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1169226 - pmwebd fails to build on el5 since converting to C++
        https://bugzilla.redhat.com/show_bug.cgi?id=1169226
  [ 2 ] Bug #1194324 - Please switch pcp to Python 3
        https://bugzilla.redhat.com/show_bug.cgi?id=1194324
--------------------------------------------------------------------------------


================================================================================
 phpMyAdmin4-4.0.10.9-1.el5 (FEDORA-EPEL-2015-1029)
 Handle the administration of MySQL over the World Wide Web
--------------------------------------------------------------------------------
Update Information:

phpMyAdmin 4.0.10.9 (2015-03-04)
================================

  - [security] Risk of BREACH attack, see PMASA-2015-1
--------------------------------------------------------------------------------
ChangeLog:

* Wed Mar  4 2015 Robert Scheck <[email protected]> 4.0.10.9-1
- Upgrade to 4.0.10.9
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1198794 - CVE-2015-2206 phpMyAdmin: Risk of BREACH attack due to 
reflected parameter (PMASA-2015-1)
        https://bugzilla.redhat.com/show_bug.cgi?id=1198794
--------------------------------------------------------------------------------


================================================================================
 putty-0.63-4.el5 (FEDORA-EPEL-2015-1044)
 SSH, Telnet and Rlogin client
--------------------------------------------------------------------------------
Update Information:

Fixed an issue when private keys weren't scrub from memory after use.

--------------------------------------------------------------------------------
ChangeLog:

* Tue Mar  3 2015 Jaroslav Škarvada <[email protected]> - 0.63-4
- Scrub private keys from memory after use
  Resolves: CVE-2015-2157
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1198192 - CVE-2015-2157 putty: failure to scrub private keys from 
memory after use
        https://bugzilla.redhat.com/show_bug.cgi?id=1198192
--------------------------------------------------------------------------------


================================================================================
 rdiff-backup-1.0.5-3.el5 (FEDORA-EPEL-2015-1098)
 Convenient and transparent local/remote incremental mirror/backup
--------------------------------------------------------------------------------
Update Information:

Changes in librsync 1.0.0 (2015-01-23)
======================================

  * SECURITY: CVE-2014-8242: librsync previously used a truncated MD4 "strong" 
check sum to match blocks. However, MD4 is not cryptographically strong. It's 
possible that an attacker who can control the contents of one part of a file 
could use it to control other regions of the file, if it's transferred using 
librsync/rdiff. For example this might occur in a database, mailbox, or VM 
image containing some attacker-controlled data. To mitigate this issue, 
signatures will by default be computed with a 256-bit BLAKE2 hash. Old versions 
of librsync will complain about a bad magic number when given these signature 
files. Backward compatibility can be obtained using the new `rdiff sig 
--hash=md4` option or through specifying the "signature magic" in the API, but 
this should not be used when either the old or new file contain untrusted data. 
Deltas generated from those signatures will also use BLAKE2 during generation, 
but produce output that can be read by old versions. See 
https://github.com/librsync/librsync/issues/5. Thanks to Michael Samuel 
<miknet.net> for reporting this and offering an initial patch.
  * Various build fixes, thanks Timothy Gu.
  * Improved rdiff man page from Debian.
  * Improved librsync.spec file for building RPMs.
  * Fixed bug #1110812 'internal error: job made no progress'; on large files.
  * Moved hosting to https://github.com/librsync/librsync/
  * Travis-CI.org integration test at https://travis-ci.org/librsync/librsync/
  * Remove bundled copy of popt; it must be installed separately.
  * You can set `$LIBTOOLIZE` before running `autogen.sh`, for example on OS X 
Homebrew where it is called `glibtoolize`.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1126712 - CVE-2014-8242 librsync: MD4 collision file corruption
        https://bugzilla.redhat.com/show_bug.cgi?id=1126712
--------------------------------------------------------------------------------


================================================================================
 root-5.34.26-1.el5 (FEDORA-EPEL-2015-1169)
 Numerical data analysis framework
--------------------------------------------------------------------------------
Update Information:

root 5.34.26

https://root.cern.ch/drupal/content/patch-release-53426

--------------------------------------------------------------------------------
ChangeLog:

* Tue Feb 24 2015 Mattias Ellert <[email protected]> - 5.34.26-1
- Update to 5.34.26
- Drop patch root-xrdversion.patch
* Thu Jan 29 2015 Mattias Ellert <[email protected]> - 5.34.24-3
- Rebuild with fixed cairo (bz 1183242)
* Sat Jan 17 2015 Mamoru TASAKA <[email protected]> - 5.34.24-2
- Rebuild for https://fedoraproject.org/wiki/Changes/Ruby_2.2
--------------------------------------------------------------------------------


================================================================================
 srm-ifce-1.22.2-1.el5 (FEDORA-EPEL-2015-1041)
 SRM client side library
--------------------------------------------------------------------------------
Update Information:

Release of srm-ifce 1.22.2
--------------------------------------------------------------------------------
ChangeLog:

* Mon Mar  2 2015 Alejandro Alvarez Ayllon <aalvarez at cern.ch> - 1.22.2-1
- Release srm-ifce 1.22.2
* Mon Jan 26 2015 Alejandro Alvarez Ayllon <aalvarez at cern.ch> - 1.22.1-2
- Rebuilt for gsoap 2.8.21
--------------------------------------------------------------------------------


================================================================================
 udt-4.11-4.el5 (FEDORA-EPEL-2015-1153)
 UDP based Data Transfer Protocol
--------------------------------------------------------------------------------
Update Information:

Fix sed substitutions in case of slashes in rpm macros
--------------------------------------------------------------------------------
ChangeLog:

* Sat Mar  7 2015 Mattias Ellert <[email protected]> - 4.11-4
- Fix sed substitutions in case of slashes in rpm macros
* Mon Aug 18 2014 Fedora Release Engineering <[email protected]> 
- 4.11-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
--------------------------------------------------------------------------------


================================================================================
 userspace-rcu-0.7.7-1.el5 (FEDORA-EPEL-2015-1134)
 RCU (read-copy-update) implementation in user space
--------------------------------------------------------------------------------
Update Information:

Add userspace-rcu to EL5, porting from the EL6 build.
--------------------------------------------------------------------------------

_______________________________________________
epel-devel mailing list
[email protected]
https://admin.fedoraproject.org/mailman/listinfo/epel-devel

Reply via email to