The following Fedora EPEL 5 Security updates need testing:
 Age  URL
 1040  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2012-5630/bugzilla-3.2.10-5.el5
 495  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2013-11893/libguestfs-1.20.12-1.el5
 259  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1626/puppet-2.7.26-1.el5
 113  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3784/mantis-1.2.17-3.el5
 109  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3849/sblim-sfcb-1.3.8-2.el5
  75  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-4430/phpMyAdmin4-4.0.10.7-2.el5
  61  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-4917/dokuwiki-0-0.23.20140929b.el5
  17  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2015-0695/drupal7-path_breadcrumbs-3.2-1.el5
  12  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2015-0717/drupal6-views-2.18-1.el5


The following builds have been pushed to Fedora EPEL 5 updates-testing

    dkms-2.2.0.3-30.el5

Details about builds:


================================================================================
 dkms-2.2.0.3-30.el5 (FEDORA-EPEL-2015-0964)
 Dynamic Kernel Module Support Framework
--------------------------------------------------------------------------------
Update Information:

Add which and file requirements.
--------------------------------------------------------------------------------
ChangeLog:

* Tue Feb 24 2015 Simone Caronni <negativ...@gmail.com> - 2.2.0.3-30
- Add which and file requirements (#1194652).
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1194652 - Missing which and file requirements in dkms package spec 
file
        https://bugzilla.redhat.com/show_bug.cgi?id=1194652
--------------------------------------------------------------------------------

_______________________________________________
epel-devel mailing list
epel-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/epel-devel

Reply via email to