The following Fedora EPEL 6 Security updates need testing:
 Age  URL
  10  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2019-e7cdb404e5   
libapreq2-2.13-2.el6
  10  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2019-5393542b88   
opendmarc-1.3.2-1.el6
   9  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2019-864944c688   
python34-3.4.10-4.el6
   9  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2019-ee7bc290a9   
golang-1.13.1-1.el6
   2  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2019-55ba7663e0   
yara-3.11.0-1.el6


The following builds have been pushed to Fedora EPEL 6 updates-testing

    python-urllib-gssapi-1.0.1-13.el6
    wordpress-5.1.3-1.el6

Details about builds:


================================================================================
 python-urllib-gssapi-1.0.1-13.el6 (FEDORA-EPEL-2019-dd9283f5d0)
 A GSSAPI/SPNEGO authentication handler for urllib/urllib2
--------------------------------------------------------------------------------
Update Information:

- Introduce for epel6
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1755010 - RFE - build python-urllib-gssapi for epel
        https://bugzilla.redhat.com/show_bug.cgi?id=1755010
--------------------------------------------------------------------------------


================================================================================
 wordpress-5.1.3-1.el6 (FEDORA-EPEL-2019-be9b8a3985)
 Blog tool and publishing platform
--------------------------------------------------------------------------------
Update Information:

**WordPress 5.1.3 Security Release**  **Security Updates**  *    Props to Evan
Ricafort for finding an issue where stored XSS (cross-site scripting) could be
added via the Customizer. *    Props to J.D. Grimes who found and disclosed a
method of viewing unauthenticated posts. *    Props to Weston Ruter for finding
a way to create a stored XSS to inject Javascript into style tags. *    Props to
David Newman for highlighting a method to poison the cache of JSON GET requests
via the Vary: Origin header. *    Props to Eugene Kolodenker who found a server-
side request forgery in the way that URLs are validated. *    Props to Ben
Bidner of the WordPress Security Team who discovered issues related to referrer
validation in the admin.
--------------------------------------------------------------------------------
ChangeLog:

* Tue Oct 15 2019 Remi Collet <r...@remirepo.net> - 5.1.3-1
- WordPress 5.1.3 Security Release
--------------------------------------------------------------------------------

_______________________________________________
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org

Reply via email to