The following Fedora EPEL 6 Security updates need testing:
 Age  URL
 941  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2012-5620/bugzilla-3.4.14-2.el6
 160  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1616/puppet-2.7.26-1.el6
  31  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3434/pylint-1.3.1-1.el6,python-astroid-1.2.1-2.el6,python-logilab-common-0.62.1-2.el6
  27  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3527/asterisk-1.8.31.1-1.el6
  21  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3623/Pound-2.6-2.el6.1
  17  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3748/tnftp-20141031-1.el6
  14  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3790/facter-1.6.18-7.el6
   9  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3851/python-requests-kerberos-0.6-1.el6
   8  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3927/drupal7-ckeditor-1.16-2.el6
   6  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3962/oath-toolkit-2.0.2-5.el6
   6  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-4005/nginx-1.0.15-11.el6
   6  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-4008/cross-binutils-2.23.51.0.3-1.el6.1
   6  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3975/polarssl-1.3.2-3.el6
   6  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-2069/php-channel-phpseclib-1.3-1.el6,php-sabredav-Sabre_VObject-2.1.4-2.el6,php-sabredav-Sabre_HTTP-1.7.11-1.el6,php-sabredav-Sabre_DAVACL-1.7.9-1.el6,php-sabredav-Sabre_DAV-1.7.13-1.el6,php-sabredav-Sabre_CardDAV-1.7.9-2.el6,php-sabredav-Sabre_CalDAV-1.7.9-1.el6,php-irodsphp-3.3.0-0.4.beta1.el6,php-phpseclib-net-ssh2-0.3.9-1.el6,php-phpseclib-net-sftp-0.3.9-1.el6,php-phpseclib-crypt-twofish-0.3.9-2.el6,php-phpseclib-crypt-tripledes-0.3.9-2.el6,php-phpseclib-crypt-rsa-0.3.9-1.el6,php-phpseclib-crypt-rijndael-0.3.9-2.el6,php-phpseclib-crypt-rc4-0.3.9-2.el6,php-phpseclib-crypt-random-0.3.9-1.el6,php-phpseclib-crypt-hash-0.3.9-1.el6,php-phpseclib-crypt-des-0.3.9-2.el6,php-phpseclib-crypt-blowfish-0.3.9-2.el6,php-phpseclib-crypt-aes-0.3.9-1.el6,php-phpseclib-math-biginteger-0.3.9-1.el6,php-phpseclib-crypt-base-0.3.9-1.el6,owncloud-6.0.5-4.el6
   4  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-4057/moodle-2.5.9-1.el6
   0  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-4151/lsyncd-2.1.4-4.el6.1.1
   0  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-4144/nodejs-0.10.33-1.el6,libuv-0.10.29-1.el6


The following builds have been pushed to Fedora EPEL 6 updates-testing

    abduco-0.2-1.el6
    dmlite-0.7.2-1.el6
    golang-github-docker-libcontainer-1.2.0-3.git28cb5f9.el6
    golang-googlecode-goauth2-0-0.4.hgafe77d958c70.el6
    gparted-0.19.1-1.el6
    libuv-0.10.29-1.el6
    lsyncd-2.1.4-4.el6.1.1
    nodejs-0.10.33-1.el6
    perl-Finance-Quote-1.35-1.el6
    php-horde-Horde-Browser-2.0.8-1.el6
    php-horde-Horde-Core-2.16.1-1.el6
    php-horde-Horde-Crypt-2.5.1-1.el6
    php-horde-Horde-Db-2.2.2-1.el6
    php-horde-Horde-History-2.3.3-1.el6
    php-horde-Horde-Mime-Viewer-2.0.8-1.el6
    php-horde-Horde-Test-2.4.6-1.el6
    python-bugzilla2fedmsg-0.2.1-1.el6
    python-flask-openid-1.2.4-1.el6
    voms-2.0.12-1.el6

Details about builds:


================================================================================
 abduco-0.2-1.el6 (FEDORA-EPEL-2014-4128)
 Session management in a clean and simple way
--------------------------------------------------------------------------------
Update Information:

update to 0.2 (RHBZ #1165180)
--------------------------------------------------------------------------------
ChangeLog:

* Tue Nov 18 2014 Igor Gnatenko <i.gnatenko.br...@gmail.com> - 0.2-1
- update to 0.2 (RHBZ #1165180)
* Fri Aug 15 2014 Fedora Release Engineering <rel-...@lists.fedoraproject.org> 
- 0.1-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1165180 - abduco-0.2 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=1165180
--------------------------------------------------------------------------------


================================================================================
 dmlite-0.7.2-1.el6 (FEDORA-EPEL-2014-4153)
 Lcgdm grid data management and storage framework
--------------------------------------------------------------------------------
Update Information:

Update to 0.7.2, BugFix for too much verbose logging
--------------------------------------------------------------------------------
ChangeLog:

* Tue Nov 18 2014 Adrien Devresse <adevress at cern.ch> - 0.7.2-1
- Update to 0.7.2, BugFix for too much verbose logging
--------------------------------------------------------------------------------


================================================================================
 golang-github-docker-libcontainer-1.2.0-3.git28cb5f9.el6 
(FEDORA-EPEL-2014-4136)
 Configuration options for containers
--------------------------------------------------------------------------------
Update Information:

Resolves: rhbz#1164989 - update to atleast b9c834b7
bump to v1.2.0 commit c907e406fe81320d87b58edf74953ceb08facc13
--------------------------------------------------------------------------------
ChangeLog:

* Tue Nov 18 2014 Lokesh Mandvekar <l...@fedoraproject.org> - 1.2.0-3.git28cb5f9
- Resolves: rhbz#1164989 - update to atleast b9c834b7
* Fri Oct 24 2014 Lokesh Mandvekar <l...@fedoraproject.org> - 1.2.0-1.gitc907e40
- bump to v1.2.0 commit c907e406fe81320d87b58edf74953ceb08facc13
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1164989 - update to at least version b9c834b7
        https://bugzilla.redhat.com/show_bug.cgi?id=1164989
--------------------------------------------------------------------------------


================================================================================
 golang-googlecode-goauth2-0-0.4.hgafe77d958c70.el6 (FEDORA-EPEL-2014-4129)
 OAuth 2.0 for Go clients
--------------------------------------------------------------------------------
Update Information:

Choose the correct architecture
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1141822 - Review Request: golang-googlecode-goauth2 - OAuth 2.0 
for Go clients
        https://bugzilla.redhat.com/show_bug.cgi?id=1141822
--------------------------------------------------------------------------------


================================================================================
 gparted-0.19.1-1.el6 (FEDORA-EPEL-2014-4145)
 Gnome Partition Editor
--------------------------------------------------------------------------------
Update Information:

Update to 0.19.1

Major version update as discussed in bz#1133315
--------------------------------------------------------------------------------
ChangeLog:

* Tue Nov 18 2014 Mukundan Ragavan <nonamed...@fedoraproject.org> - 0.19.1-2
- Added BR:intltool
* Mon Nov 17 2014 Mukundan Ragavan <nonamed...@fedoraproject.org> - 0.19.1-1
- Update to latest upstream version
- Major version update discussed in bug#1133315
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1133315 - Update to latest GParted in EL5 and EL6
        https://bugzilla.redhat.com/show_bug.cgi?id=1133315
--------------------------------------------------------------------------------


================================================================================
 libuv-0.10.29-1.el6 (FEDORA-EPEL-2014-4144)
 Platform layer for node.js
--------------------------------------------------------------------------------
Update Information:

This release handles the recent POODLE vulnerability by disabling SSLv2/SSLv3
by default for the most predominate uses of TLS in Node.js.

It took longer than expected to get this release accomplished in a way that
would provide appropriate default security settings, while minimizing the
surface area for the behavior change we were introducing. It was also important
that we validated that our changes were being applied in the variety of
configurations we support in our APIs.

With this release, we are confident that the only behavior change is that of
the default allowed protocols do not include SSLv2 or SSLv3. Though you are
still able to programatically consume those protocols if necessary.

Included is the documentation that you can find at
https://nodejs.org/api/tls.html#tls_protocol_support that describes how this
works going forward for client and server implementations.

---

Node.js is compiled with SSLv2 and SSLv3 protocol support by default, but these
protocols are **disabled**. They are considered insecure and could be easily
compromised as was shown by CVE-2014-3566. However, in some situations, it
may cause problems with legacy clients/servers (such as Internet Explorer 6).
If you wish to enable SSLv2 or SSLv3, run node with the `--enable-ssl2` or
`--enable-ssl3` flag respectively.  In future versions of Node.js SSLv2 and
SSLv3 will not be compiled in by default.

There is a way to force node into using SSLv3 or SSLv2 only mode by explicitly
specifying `secureProtocol` to `'SSLv3_method'` or `'SSLv2_method'`.

The default protocol method Node.js uses is `SSLv23_method` which would be more
accurately named `AutoNegotiate_method`. This method will try and negotiate
from the highest level down to whatever the client supports.  To provide a
secure default, Node.js (since v0.10.33) explicitly disables the use of SSLv3
and SSLv2 by setting the `secureOptions` to be
`SSL_OP_NO_SSLv3|SSL_OP_NO_SSLv2` (again, unless you have passed
`--enable-ssl3`, or `--enable-ssl2`, or `SSLv3_method` as `secureProtocol`).

If you have set `securityOptions` to anything, we will not override your
options.

The ramifications of this behavior change:

 * If your application is behaving as a secure server, clients who are `SSLv3`
only will now not be able to appropriately negotiate a connection and will be
refused. In this case your server will emit a `clientError` event. The error
message will include `'wrong version number'`.
 * If your application is behaving as a secure client and communicating with a
server that doesn't support methods more secure than SSLv3 then your connection
won't be able to negotiate and will fail. In this case your client will emit a
an `error` event. The error message will include `'wrong version number'`.

---

2014.10.20, node.js Version 0.10.33 (Stable)

* child_process: properly support optional args (cjihrig)

* crypto: Disable autonegotiation for SSLv2/3 by default (Fedor Indutny, 
Timothy J Fontaine, Alexis Campailla)

This is a behavior change, by default we will not allow the negotiation to
SSLv2 or SSLv3. If you want this behavior, run Node.js with either
`--enable-ssl2` or `--enable-ssl3` respectively.

This does not change the behavior for users specifically requesting
`SSLv2_method` or `SSLv3_method`. While this behavior is not advised, it is
assumed you know what you're doing since you're specifically asking to use
these methods.

---

2014.10.21, libuv Version 0.10.29 (Stable)

Relevant changes since version 0.10.28:

* linux: try epoll_pwait if epoll_wait is missing (Michael Hudson-Doyle)

--------------------------------------------------------------------------------
ChangeLog:

* Wed Nov 19 2014 T.C. Hollingsworth <tchollingswo...@gmail.com> - 1:0.10.29-1
- new upstream release 0.10.29
  https://github.com/joyent/libuv/blob/v0.10.29/ChangeLog
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1152789 - CVE-2014-3566 SSL/TLS: Padding Oracle On Downgraded 
Legacy Encryption attack
        https://bugzilla.redhat.com/show_bug.cgi?id=1152789
--------------------------------------------------------------------------------


================================================================================
 lsyncd-2.1.4-4.el6.1.1 (FEDORA-EPEL-2014-4151)
 File change monitoring and synchronization daemon
--------------------------------------------------------------------------------
Update Information:

Fix bad shell argument escaping
--------------------------------------------------------------------------------
ChangeLog:

* Tue Nov 18 2014 Lubomir Rintel <lkund...@v3.sk> - 2.1.4-4.1.1
- Fix bad shell argument escaping
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1165078 - lsyncd: command injection through backticks in a filename
        https://bugzilla.redhat.com/show_bug.cgi?id=1165078
--------------------------------------------------------------------------------


================================================================================
 nodejs-0.10.33-1.el6 (FEDORA-EPEL-2014-4144)
 JavaScript runtime
--------------------------------------------------------------------------------
Update Information:

This release handles the recent POODLE vulnerability by disabling SSLv2/SSLv3
by default for the most predominate uses of TLS in Node.js.

It took longer than expected to get this release accomplished in a way that
would provide appropriate default security settings, while minimizing the
surface area for the behavior change we were introducing. It was also important
that we validated that our changes were being applied in the variety of
configurations we support in our APIs.

With this release, we are confident that the only behavior change is that of
the default allowed protocols do not include SSLv2 or SSLv3. Though you are
still able to programatically consume those protocols if necessary.

Included is the documentation that you can find at
https://nodejs.org/api/tls.html#tls_protocol_support that describes how this
works going forward for client and server implementations.

---

Node.js is compiled with SSLv2 and SSLv3 protocol support by default, but these
protocols are **disabled**. They are considered insecure and could be easily
compromised as was shown by CVE-2014-3566. However, in some situations, it
may cause problems with legacy clients/servers (such as Internet Explorer 6).
If you wish to enable SSLv2 or SSLv3, run node with the `--enable-ssl2` or
`--enable-ssl3` flag respectively.  In future versions of Node.js SSLv2 and
SSLv3 will not be compiled in by default.

There is a way to force node into using SSLv3 or SSLv2 only mode by explicitly
specifying `secureProtocol` to `'SSLv3_method'` or `'SSLv2_method'`.

The default protocol method Node.js uses is `SSLv23_method` which would be more
accurately named `AutoNegotiate_method`. This method will try and negotiate
from the highest level down to whatever the client supports.  To provide a
secure default, Node.js (since v0.10.33) explicitly disables the use of SSLv3
and SSLv2 by setting the `secureOptions` to be
`SSL_OP_NO_SSLv3|SSL_OP_NO_SSLv2` (again, unless you have passed
`--enable-ssl3`, or `--enable-ssl2`, or `SSLv3_method` as `secureProtocol`).

If you have set `securityOptions` to anything, we will not override your
options.

The ramifications of this behavior change:

 * If your application is behaving as a secure server, clients who are `SSLv3`
only will now not be able to appropriately negotiate a connection and will be
refused. In this case your server will emit a `clientError` event. The error
message will include `'wrong version number'`.
 * If your application is behaving as a secure client and communicating with a
server that doesn't support methods more secure than SSLv3 then your connection
won't be able to negotiate and will fail. In this case your client will emit a
an `error` event. The error message will include `'wrong version number'`.

---

2014.10.20, node.js Version 0.10.33 (Stable)

* child_process: properly support optional args (cjihrig)

* crypto: Disable autonegotiation for SSLv2/3 by default (Fedor Indutny, 
Timothy J Fontaine, Alexis Campailla)

This is a behavior change, by default we will not allow the negotiation to
SSLv2 or SSLv3. If you want this behavior, run Node.js with either
`--enable-ssl2` or `--enable-ssl3` respectively.

This does not change the behavior for users specifically requesting
`SSLv2_method` or `SSLv3_method`. While this behavior is not advised, it is
assumed you know what you're doing since you're specifically asking to use
these methods.

---

2014.10.21, libuv Version 0.10.29 (Stable)

Relevant changes since version 0.10.28:

* linux: try epoll_pwait if epoll_wait is missing (Michael Hudson-Doyle)

--------------------------------------------------------------------------------
ChangeLog:

* Wed Nov 19 2014 T.C. Hollingsworth <tchollingswo...@gmail.com> - 0.10.33-1
- new upstream release 0.10.33
  http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/
- This release disables SSLv3 to secure Node.js services against the POODLE
  attack.  (CVE-2014-3566; RHBZ#1152789)  For more information or to learn how
  to re-enable SSLv3 in order to support legacy clients, please see the upstream
  release announcement linked above.
* Tue Oct 21 2014 T.C. Hollingsworth <tchollingswo...@gmail.com> - 0.10.32-2
- add Provides nodejs-punycode (RHBZ#1151811)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1152789 - CVE-2014-3566 SSL/TLS: Padding Oracle On Downgraded 
Legacy Encryption attack
        https://bugzilla.redhat.com/show_bug.cgi?id=1152789
--------------------------------------------------------------------------------


================================================================================
 perl-Finance-Quote-1.35-1.el6 (FEDORA-EPEL-2014-4148)
 A Perl module that retrieves stock and mutual fund quotes
--------------------------------------------------------------------------------
Update Information:

This update, to the current upstream release, includes some fixes for existing 
data sources and a number of new data sources.
--------------------------------------------------------------------------------
ChangeLog:

* Tue Nov 18 2014 Paul Howarth <p...@city-fan.org> - 1.35-1
- Update to 1.35
- Clean up and modernize spec somewhat
--------------------------------------------------------------------------------


================================================================================
 php-horde-Horde-Browser-2.0.8-1.el6 (FEDORA-EPEL-2014-4143)
 Horde Browser API
--------------------------------------------------------------------------------
Update Information:

Horde_Browser 2.0.8
* [jan] Consider all user agents with 'bot' in the name as robots.

Horde_Test 2.4.6
* [jan] Add convertUsername() to Horde_Test_Stub_Registry.

Horde_Db 2.2.2
* [jan] Make Oracle's updateBlob() compatible with PHP 5.3.

Horde_History 2.3.3
* [jan] Fix migration with Oracle.

Horde_Crypt 2.5.1
* [jan] Fix using non-deprecated Content-Type for encrypted messages (Bug 
#13659).

Horde_Mime_Viewer 2.0.8
* [mms] More thorough handling of tar.gz data.


--------------------------------------------------------------------------------
ChangeLog:

* Tue Nov 18 2014 Remi Collet <r...@fedoraproject.org> - 2.0.8-1
- Update to 2.0.8
- add dependency on Horde_Translation
--------------------------------------------------------------------------------


================================================================================
 php-horde-Horde-Core-2.16.1-1.el6 (FEDORA-EPEL-2014-4149)
 Horde Core Framework libraries
--------------------------------------------------------------------------------
Update Information:

Horde_Core 2.16.1:
* [mms] Fix file permissions of dynamically generated static CSS/JS files.
* [jan] Use correct user name as a fallback for identity full names with 
existing authusername hook.

Horde_Core 2.16.0:
* [mjr] Add the activesync_provisioning_check hook.
* [mjr] Fix determining multiplex settting for EAS notes (Bug #13637).
* [mjr] Fix adding new tasklists from EAS (Bug #13642).
* [jan] Update Czech translation (Michael Grafnetter).

--------------------------------------------------------------------------------
ChangeLog:

* Thu Nov  6 2014 Remi Collet <r...@fedoraproject.org> - 2.16.1-1
- Update to 2.16.1
- raise dependency on Horde_Translation >= 2.2.0
--------------------------------------------------------------------------------


================================================================================
 php-horde-Horde-Crypt-2.5.1-1.el6 (FEDORA-EPEL-2014-4143)
 Horde Cryptography API
--------------------------------------------------------------------------------
Update Information:

Horde_Browser 2.0.8
* [jan] Consider all user agents with 'bot' in the name as robots.

Horde_Test 2.4.6
* [jan] Add convertUsername() to Horde_Test_Stub_Registry.

Horde_Db 2.2.2
* [jan] Make Oracle's updateBlob() compatible with PHP 5.3.

Horde_History 2.3.3
* [jan] Fix migration with Oracle.

Horde_Crypt 2.5.1
* [jan] Fix using non-deprecated Content-Type for encrypted messages (Bug 
#13659).

Horde_Mime_Viewer 2.0.8
* [mms] More thorough handling of tar.gz data.


--------------------------------------------------------------------------------
ChangeLog:

* Tue Nov 18 2014 Remi Collet <r...@fedoraproject.org> - 2.5.1-1
- Update to 2.5.1
- raise dependency on Horde_Translation 2.2.0
--------------------------------------------------------------------------------


================================================================================
 php-horde-Horde-Db-2.2.2-1.el6 (FEDORA-EPEL-2014-4143)
 Horde Database Libraries
--------------------------------------------------------------------------------
Update Information:

Horde_Browser 2.0.8
* [jan] Consider all user agents with 'bot' in the name as robots.

Horde_Test 2.4.6
* [jan] Add convertUsername() to Horde_Test_Stub_Registry.

Horde_Db 2.2.2
* [jan] Make Oracle's updateBlob() compatible with PHP 5.3.

Horde_History 2.3.3
* [jan] Fix migration with Oracle.

Horde_Crypt 2.5.1
* [jan] Fix using non-deprecated Content-Type for encrypted messages (Bug 
#13659).

Horde_Mime_Viewer 2.0.8
* [mms] More thorough handling of tar.gz data.


--------------------------------------------------------------------------------
ChangeLog:

* Tue Nov 18 2014 Remi Collet <r...@fedoraproject.org> - 2.2.2-1
- Update to 2.2.2
* Thu Nov  6 2014 Remi Collet <r...@fedoraproject.org> - 2.2.0-1
- Update to 2.2.0
- open https://github.com/horde/horde/pull/113 for php 5.3
--------------------------------------------------------------------------------


================================================================================
 php-horde-Horde-History-2.3.3-1.el6 (FEDORA-EPEL-2014-4143)
 API for tracking the history of an object
--------------------------------------------------------------------------------
Update Information:

Horde_Browser 2.0.8
* [jan] Consider all user agents with 'bot' in the name as robots.

Horde_Test 2.4.6
* [jan] Add convertUsername() to Horde_Test_Stub_Registry.

Horde_Db 2.2.2
* [jan] Make Oracle's updateBlob() compatible with PHP 5.3.

Horde_History 2.3.3
* [jan] Fix migration with Oracle.

Horde_Crypt 2.5.1
* [jan] Fix using non-deprecated Content-Type for encrypted messages (Bug 
#13659).

Horde_Mime_Viewer 2.0.8
* [mms] More thorough handling of tar.gz data.


--------------------------------------------------------------------------------
ChangeLog:

* Tue Nov 18 2014 Remi Collet <r...@fedoraproject.org> - 2.3.3-1
- Update to 2.3.3
--------------------------------------------------------------------------------


================================================================================
 php-horde-Horde-Mime-Viewer-2.0.8-1.el6 (FEDORA-EPEL-2014-4143)
 Horde MIME Viewer Library
--------------------------------------------------------------------------------
Update Information:

Horde_Browser 2.0.8
* [jan] Consider all user agents with 'bot' in the name as robots.

Horde_Test 2.4.6
* [jan] Add convertUsername() to Horde_Test_Stub_Registry.

Horde_Db 2.2.2
* [jan] Make Oracle's updateBlob() compatible with PHP 5.3.

Horde_History 2.3.3
* [jan] Fix migration with Oracle.

Horde_Crypt 2.5.1
* [jan] Fix using non-deprecated Content-Type for encrypted messages (Bug 
#13659).

Horde_Mime_Viewer 2.0.8
* [mms] More thorough handling of tar.gz data.


--------------------------------------------------------------------------------
ChangeLog:

* Tue Nov 18 2014 Remi Collet <r...@fedoraproject.org> - 2.0.8-1
- Update to 2.0.8
- raise dependency on Horde_Translation 2.2.0
--------------------------------------------------------------------------------


================================================================================
 php-horde-Horde-Test-2.4.6-1.el6 (FEDORA-EPEL-2014-4143)
 Horde testing base classes
--------------------------------------------------------------------------------
Update Information:

Horde_Browser 2.0.8
* [jan] Consider all user agents with 'bot' in the name as robots.

Horde_Test 2.4.6
* [jan] Add convertUsername() to Horde_Test_Stub_Registry.

Horde_Db 2.2.2
* [jan] Make Oracle's updateBlob() compatible with PHP 5.3.

Horde_History 2.3.3
* [jan] Fix migration with Oracle.

Horde_Crypt 2.5.1
* [jan] Fix using non-deprecated Content-Type for encrypted messages (Bug 
#13659).

Horde_Mime_Viewer 2.0.8
* [mms] More thorough handling of tar.gz data.


--------------------------------------------------------------------------------
ChangeLog:

* Tue Nov 18 2014 Remi Collet <r...@fedoraproject.org> - 2.4.6-1
- Update to 2.4.6
--------------------------------------------------------------------------------


================================================================================
 python-bugzilla2fedmsg-0.2.1-1.el6 (FEDORA-EPEL-2014-4130)
 Consume BZ messages over STOMP and republish to fedmsg
--------------------------------------------------------------------------------
Update Information:

Accomodate rhbz#1139955.
--------------------------------------------------------------------------------
ChangeLog:

* Tue Nov 18 2014 Ralph Bean <rb...@redhat.com> - 0.2.1-1
- Latest upstream handles timezones for rhbz#1139955.
* Tue Sep 30 2014 Ralph Bean <rb...@redhat.com> - 0.2.0-1
- Reorganized internally to rely on fedmsg queueing.
* Sat Jun  7 2014 Fedora Release Engineering <rel-...@lists.fedoraproject.org> 
- 0.1.3-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
--------------------------------------------------------------------------------


================================================================================
 python-flask-openid-1.2.4-1.el6 (FEDORA-EPEL-2014-4146)
 OpenID support for Flask
--------------------------------------------------------------------------------
Update Information:

Update to 1.2.4
--------------------------------------------------------------------------------
ChangeLog:

* Tue Nov 18 2014 Praveen Kumar <kumarpraveen.nit...@gmail.com> 1.2.4-1
- Update to 1.2.4
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1164867 - Please update to the latest upstream for epel7 and epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1164867
--------------------------------------------------------------------------------


================================================================================
 voms-2.0.12-1.el6 (FEDORA-EPEL-2014-4133)
 Virtual Organization Membership Service
--------------------------------------------------------------------------------
Update Information:

VOMS update
--------------------------------------------------------------------------------
ChangeLog:

* Mon Nov 17 2014 Mattias Ellert <mattias.ell...@fysast.uu.se> - 2.0.12-1
- Update to version 2.0.12
- Drop patches voms-gsoap.patch, voms-sha2-proxy.patch and voms-strndup.patch
  (accepted upstream)
- Add alternatives to the client package to allow parallel installation of
  the java implementation of the client tools
* Mon Aug 18 2014 Fedora Release Engineering <rel-...@lists.fedoraproject.org> 
- 2.0.11-10
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
* Sun Jul 13 2014 Mattias Ellert <mattias.ell...@fysast.uu.se> - 2.0.11-9
- Rebuild properly
* Sun Jul 13 2014 Mattias Ellert <mattias.ell...@fysast.uu.se> - 2.0.11-8
- Rebuild for gsoap 2.8.17 (Fedora 22)
--------------------------------------------------------------------------------

_______________________________________________
epel-devel mailing list
epel-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/epel-devel

Reply via email to