The following Fedora EPEL 8 Security updates need testing:
 Age  URL
   4  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-9f67252d52   
chromium-105.0.5195.125-2.el8
   2  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-6319bfdcaa   
python-dnslib-0.9.21-1.el8
   2  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-3bebee4625   
openssl3-3.0.1-41.el8.1
   1  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-54e8e9bf3b   
dropbear-2019.78-4.el8
   1  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-39cd10714f   
lighttpd-1.4.67-1.el8


The following builds have been pushed to Fedora EPEL 8 updates-testing

    gitqlient-1.5.0-2.el8
    intel-ipsec-mb-1.3.0-1.el8

Details about builds:


================================================================================
 gitqlient-1.5.0-2.el8 (FEDORA-EPEL-2022-f70a782e69)
 Multi-platform Git client written with Qt
--------------------------------------------------------------------------------
Update Information:

Update to latest version
--------------------------------------------------------------------------------
ChangeLog:

* Fri Sep 30 2022 Artem Polishchuk <ego.corda...@gmail.com> 1.5.0-2
- build: Add qt5-qtsvg dep | rhbz#2001086
* Thu Sep 29 2022 Artem Polishchuk <ego.corda...@gmail.com> 1.5.0-1
- chore(update): 1.5.0
* Thu Jul 21 2022 Fedora Release Engineering <rel...@fedoraproject.org> - 
1.4.3-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild
* Thu Jan 20 2022 Fedora Release Engineering <rel...@fedoraproject.org> - 
1.4.3-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2001086 - Button and menu icons missing if you don't install qtsvg
        https://bugzilla.redhat.com/show_bug.cgi?id=2001086
  [ 2 ] Bug #2090570 - CVE-2022-21680 gitqlient: marked: regular expression 
block.def may lead Denial of Service [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2090570
  [ 3 ] Bug #2092713 - CVE-2022-21681 gitqlient: marked: regular expression 
inline.reflinkSearch may lead Denial of Service [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2092713
--------------------------------------------------------------------------------


================================================================================
 intel-ipsec-mb-1.3.0-1.el8 (FEDORA-EPEL-2022-7395ecb083)
 IPsec cryptography library optimized for Intel Architecture
--------------------------------------------------------------------------------
Update Information:

* ZUC-EIA3-256 8-byte and 16-byte tag support added for SSE, AVX, AVX2 and
AVX512 * AES-ECB AVX512-VAES implementation added *AES-ECB optimizations for AVX
and SSE * AES-ECB AVX2-VAES implementation added * JOB API GHASH support added *
SHA1/224/256/384/512 multi-buffer implementation added * Multi-buffer SHA1,
SHA224 and SHA256 use SHANI if available * Synchronous cipher and hash burst API
added (cipher API only supports AES-CBC and AES-CTR and hash API only supports
HMAC-SHA1, * HMAC-224, HMAC-256, HMAC-384 and HMAC-512) * Asynchronous burst API
added that supports all cipher and hash modes * SNOW3G-UEA2 SSE multi-buffer
implementation added * SNOW3G-UIA2 SSE multi-buffer initialization and key-
stream generation added * SNOW3G-UEA2 and SNOW3G-UIA2 SSE implementation used in
JOB API for AVX and AVX2 architectures * New SGL job API (AES-GCM and
CHACHA20-POLY1305 only) * Enforced EVEX PMADD52 encoding in AVX512 code *
Restructured reset flow of architecture managers * SSE, AVX, AVX2 and AVX512
managers were split to better cover different types * Added library self-test
functionality enbranch64 not emitted on Windows builds (CET related) * use SHANI
extensions in AVX2 type-2 and AVX type-2 for SHA224, HMAC-SHA224, SHA256 and
HMAC-SHA256 * use SHANI extensions in AVX type-2 for SHA1, HMAC-SHA1 * no-GFNI
option added to help with testing
--------------------------------------------------------------------------------
ChangeLog:

* Wed Sep 28 2022 Marcel Cornu <marcel.d.co...@intel.com> 1.3.0-1
- Update for release package v1.3
* Thu Jul 21 2022 Fedora Release Engineering <rel...@fedoraproject.org> - 
1.2.0-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild
* Wed Mar  2 2022 Marcel Cornu <marcel.d.co...@intel.com> 1.2.0-2
- Correct spelling of IPsec in package description
--------------------------------------------------------------------------------

_______________________________________________
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to