The following Fedora EPEL 5 Security updates need testing:
Age URL
811 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2014-1626
puppet-2.7.26-1.el5
660 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2014-3849
sblim-sfcb-1.3.8-2.el5
303 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-edbea40516
mcollective-2.8.4-1.el5
275 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-582c8075e6
thttpd-2.25b-24.el5
58 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-c03e77f531
nginx-1.10.1-1.el5
12 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-5475bf961d
lcms2-2.8-2.el5
6 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-53ac7fc86d
openvpn-2.3.12-1.el5
5 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-f91c5f9cf4
canl-c-2.1.7-1.el5
1 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-da5e8da1d0
phpMyAdmin4-4.0.10.17-2.el5
The following builds have been pushed to Fedora EPEL 5 updates-testing
clatd-1.4-2.el5
Details about builds:
clatd-1.4-2.el5 (FEDORA-EPEL-2016-80d9bf670b)
CLAT / SIIT-DC Edge Relay implementation for Linux
Update Information:
clatd implements the CLAT component of the 464XLAT network architecture
specified in RFC 6877. It allows an IPv6-only host to have IPv4 connectivity
that is translated to IPv6 before being routed to an upstream PLAT (which is
typically a Stateful NAT64 operated by the ISP) and there translated back to
IPv4 before being routed to the IPv4 internet. For the actual package
shuffling, clatd uses tayga, a userspace nat64 daemon.
References:
[ 1 ] Bug #1302876 - Review Request: clatd - CLAT / SIIT-DC Edge Relay
implementation for Linux
https://bugzilla.redhat.com/show_bug.cgi?id=1302876
___
epel-devel mailing list
epel-devel@lists.fedoraproject.org
https://lists.fedoraproject.org/admin/lists/epel-devel@lists.fedoraproject.org