The following Fedora EPEL 5 Security updates need testing:
 Age  URL
 866  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2013-11893   
libguestfs-1.20.12-1.el5
 630  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2014-1626   
puppet-2.7.26-1.el5
 480  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2014-3849   
sblim-sfcb-1.3.8-2.el5
 123  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-edbea40516   
mcollective-2.8.4-1.el5
  94  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-582c8075e6   
thttpd-2.25b-24.el5
   6  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-64da3a7a91   
drupal6-6.38-1.el5
   4  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-f158c9e72f   
drupal7-7.43-1.el5
   1  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-085f094286   
php-htmLawed-1.1.21-1.el5
   1  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-66faa4ea19   
openssl101e-1.0.1e-7.el5
   0  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-9c7ed6c982   
websvn-2.3.3-12.el5


The following builds have been pushed to Fedora EPEL 5 updates-testing

    websvn-2.3.3-12.el5

Details about builds:


================================================================================
 websvn-2.3.3-12.el5 (FEDORA-EPEL-2016-9c7ed6c982)
 Online subversion repository browser
--------------------------------------------------------------------------------
Update Information:

- Fix CVE-2016-2511
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1310760 - CVE-2016-2511 websvn: reflected cross-site scripting 
[epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1310760
  [ 2 ] Bug #1310759 - CVE-2016-2511 websvn: reflected cross-site scripting 
[fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1310759
--------------------------------------------------------------------------------
_______________________________________________
epel-devel mailing list
[email protected]
http://lists.fedoraproject.org/admin/lists/[email protected]

Reply via email to