The following Fedora EPEL 6 Security updates need testing:
 Age  URL
 102  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2018-b6c663378c   
unrtf-0.21.9-8.el6
  40  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2018-f21474267b   
condor-8.6.11-1.el6
   6  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2018-130324cf61   
gitolite3-3.6.9-1.el6
   3  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2018-154bc7ea13   
php-tcpdf-6.2.22-1.el6
   2  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2018-51146daa45   
hylafax+-5.6.1-1.el6


The following builds have been pushed to Fedora EPEL 6 updates-testing

    lcms2-2.8-6.el6
    mozilla-noscript-10.1.9.6-1.el6
    pcre2-10.21-22.el6
    twa-1.3.1-1.el6

Details about builds:


================================================================================
 lcms2-2.8-6.el6 (FEDORA-EPEL-2018-8667fe68a8)
 Color Management Engine
--------------------------------------------------------------------------------
Update Information:

Security fix for CVE-2018-16435
--------------------------------------------------------------------------------
ChangeLog:

* Tue Sep 18 2018 Rex Dieter <rdie...@fedoraproject.org> - 2.8-6
- (branch) CVE-2018-16435 lcms2: heap-based buffer overflow in SetData function 
in cmsIT8LoadFromFile (#1628969)
* Thu Aug  3 2017 Fedora Release Engineering <rel...@fedoraproject.org> - 2.8-5
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild
* Wed Jul 26 2017 Fedora Release Engineering <rel...@fedoraproject.org> - 2.8-4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild
* Fri Feb 10 2017 Fedora Release Engineering <rel...@fedoraproject.org> - 2.8-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1628969 - CVE-2018-16435 lcms2: heap-based buffer overflow in 
SetData function in cmsIT8LoadFromFile
        https://bugzilla.redhat.com/show_bug.cgi?id=1628969
--------------------------------------------------------------------------------


================================================================================
 mozilla-noscript-10.1.9.6-1.el6 (FEDORA-EPEL-2018-0d793474b0)
 JavaScript white list extension for Mozilla Firefox
--------------------------------------------------------------------------------
Update Information:

This update introduces NoScript version 10 (WebExtension-compatible) required
for Firefox 60 ESR and moves the legacy (classic) version 5.x to SeaMonkey-
specific folder.  v 5.1.8.7
============================================================= * [Security] Fixed
script blocking bypass zero-day (thanks   Zerodium for unresponsible disclosure,
https://twitter.com/Zerodium/status/1039127214602641409) * [Surrogate] Fixed
typo in 2mdn replacement (thansk barbaz) * [XSS] Fixed InjectionChecker choking
at some big JSON   payloads sents as POST form data * [XSS] In-depth protection
against native ES6 modules abuse * Fixed classic beta channel users being
accidentally   migrated to stable (thanks barbaz)
--------------------------------------------------------------------------------
ChangeLog:

* Sun Sep 16 2018 Dominik Mierzejewski <r...@greysector.net> - 10.1.9.6-1
- update to 10.1.9.6
- keep the classic version for seamonkey users
* Sun Sep 16 2018 Dominik Mierzejewski <r...@greysector.net> - 5.1.8.7-1
- update to 5.1.8.7 (fixes CVE-2018-16983)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1629212 - CVE-2018-16983 mozilla-noscript: NoScript Bypass via the 
text/html;/json Content-Type value
        https://bugzilla.redhat.com/show_bug.cgi?id=1629212
--------------------------------------------------------------------------------


================================================================================
 pcre2-10.21-22.el6 (FEDORA-EPEL-2018-c3e8e16112)
 Perl-compatible regular expression library
--------------------------------------------------------------------------------
Update Information:

This release fixes a a subject buffer overread in JIT when UTF is disabled and
\X or \R has a greater than 1 fixed quantifier.
--------------------------------------------------------------------------------
ChangeLog:

* Tue Sep 18 2018 Petr Pisar <ppi...@redhat.com> - 10.21-22
- Fix a subject buffer overread in JIT when UTF is disabled and \X or \R has
  a greater than 1 fixed quantifier (upstream bug #2320)
--------------------------------------------------------------------------------


================================================================================
 twa-1.3.1-1.el6 (FEDORA-EPEL-2018-326d748f33)
 Tiny web auditor with strong opinions
--------------------------------------------------------------------------------
Update Information:

New package - first bodhi update
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1629446 - Review Request: twa - tiny web auditor
        https://bugzilla.redhat.com/show_bug.cgi?id=1629446
--------------------------------------------------------------------------------
_______________________________________________
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org

Reply via email to