[EPEL-devel] Fedora EPEL 5 updates-testing report
updates at fedoraproject.org
updates at fedoraproject.org
Fri Aug 28 05:19:07 UTC 2015
The following Fedora EPEL 5 Security updates need testing:
Age URL
677 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2013-11893 libguestfs-1.20.12-1.el5
442 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2014-1626 puppet-2.7.26-1.el5
291 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2014-3849 sblim-sfcb-1.3.8-2.el5
9 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-7699 drupal6-views_bulk_operations-1.17-1.el5
5 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-7734 drupal7-7.39-1.el5
1 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-7804 drupal6-ctools-1.14-1.el5
0 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-7825 drupal6-6.37-1.el5
The following builds have been pushed to Fedora EPEL 5 updates-testing
drupal6-6.37-1.el5
mozilla-https-everywhere-5.1.0-1.el5
Details about builds:
================================================================================
drupal6-6.37-1.el5 (FEDORA-EPEL-2015-7825)
An open-source content-management platform
--------------------------------------------------------------------------------
Update Information:
Maintenance and security release of the Drupal 6 series. This release fixes
**security vulnerabilities**. Sites are [urged to upgrade
immediately](https://www.drupal.org/node/1494290) after reading the notes below
and the security announcement: [Drupal Core - Critical - Multiple
Vulnerabilities - SA-CORE-2015-003](https://www.drupal.org/SA-CORE-2015-003) No
other fixes are included. No changes have been made to the .htaccess,
robots.txt or default settings.php files in this release, so upgrading custom
versions of those files is not necessary. #### Known issues: None. #### Major
changes since 6.36: * For security reasons, the autocomplete system now makes
Ajax requests to non-clean URLs only, although protection is also in place for
custom code that does so using clean URLs. There is a new form API #process
function on autocomplete-enabled text fields that is required for the
autocomplete functionality to work; custom and contributed modules should ensure
that they are not overriding this #process function accidentally when altering
text fields on forms. Part of the security fix also includes changes to
theme_textfield(); it is recommended that sites which override this theme
function make those changes as well (see the theme_textfield section of this
diff for details). * When form API token validation fails (for example, when a
cross-site request forgery attempt is detected, or a user tries to submit a form
after having logged out and back in again in the meantime), the form API now
skips calling form element value callbacks, except for a select list of
callbacks provided by Drupal core that are known to be safe. In rare cases, this
could lead to data loss when a user submits a form and receives a token
validation error, but the overall effect is expected to be minor.
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1255662 - CVE-2015-6658 CVE-2015-6659 CVE-2015-6660 CVE-2015-6661 CVE-2015-6665 drupal: Several issues in 6.x and 7.x (SA-CORE-2015-003)
https://bugzilla.redhat.com/show_bug.cgi?id=1255662
--------------------------------------------------------------------------------
================================================================================
mozilla-https-everywhere-5.1.0-1.el5 (FEDORA-EPEL-2015-7816)
HTTPS/HSTS enforcement extension for Mozilla Firefox and SeaMonkey
--------------------------------------------------------------------------------
Update Information:
mozilla-https-everywhere-5.1.0-1.el5 - Ruleset fixes - AMO signature
mozilla-https-everywhere-5.1.0-1.el6 - Ruleset fixes - AMO signature mozilla-
https-everywhere-5.1.0-1.el7 - Ruleset fixes - AMO signature
--------------------------------------------------------------------------------
More information about the epel-devel
mailing list