The following Fedora EPEL 8 Security updates need testing:
Age URL
13 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-f77315a931 seamonkey-2.53.8-1.el8
12 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-d4c3bbff96 libolm-3.2.4-2.el8
12 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-15c5b7660c suricata-5.0.7-1.el8
12 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-ac096c00b0 libtpms-0.8.4-0.20210624gita594c4692a.el8.1
4 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-f971d08ec9 chromium-91.0.4472.114-2.el8
2 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-8f073f9e87 opendmarc-1.4.1.1-3.el8
1 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-9ca0db533c kitty-0.19.3-1.el8
The following builds have been pushed to Fedora EPEL 8 updates-testing
libmongocrypt-1.2.1-1.el8
perl-ExtUtils-CChecker-0.11-1.el8
python-cachelib-0.2.0-1.el8
xrdp-0.9.16-2.el8
Details about builds:
================================================================================
libmongocrypt-1.2.1-1.el8 (FEDORA-EPEL-2021-b13d0c1a94)
The companion C library for client side encryption in drivers
--------------------------------------------------------------------------------
Update Information:
**Version 1.2.1** Fixed - Fix possible crash when oauth credentials expire.
--------------------------------------------------------------------------------
ChangeLog:
* Tue Jul 13 2021 Remi Collet <remi(a)remirepo.net> - 1.2.1-1
- update to 1.2.1
--------------------------------------------------------------------------------
================================================================================
perl-ExtUtils-CChecker-0.11-1.el8 (FEDORA-EPEL-2021-78746edd3f)
Configure-time utilities for using C headers, libraries, or OS features
--------------------------------------------------------------------------------
Update Information:
This release adds try_find_cflags_for and extend_module_build methods. It also
improves a documentation.
--------------------------------------------------------------------------------
ChangeLog:
* Tue Jul 13 2021 Petr Pisar <ppisar(a)redhat.com> - 0.11-1
- 0.11 bump
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1981476 - perl-ExtUtils-CChecker-0.11 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1981476
--------------------------------------------------------------------------------
================================================================================
python-cachelib-0.2.0-1.el8 (FEDORA-EPEL-2021-b14dbba359)
A collection of cache libraries with a common API
--------------------------------------------------------------------------------
Update Information:
New upstream release 0.2.0 - Support for Python 2 has been dropped. Only Python
3.6+ is supported. - Fix `FileSystemCache.set` incorrectly considering value
overrides on existing keys as new cache entries. - `SimpleCache` and
`FileSystemCache` first remove expired entries, followed by older entries, when
cleaning up. - Fix problem where file count was not being updated in
`FileSystemCache.get` and `FileSystemCache.has` after removals. - When
attempting to access non-existent entries with `Memcached`, these will now be
initialized with a given value `delta`.
--------------------------------------------------------------------------------
ChangeLog:
* Fri Jun 25 2021 Mat��j Grabovsk�� <mgrabovs(a)redhat.com> - 0.2.0-1
- New upstream release
--------------------------------------------------------------------------------
================================================================================
xrdp-0.9.16-2.el8 (FEDORA-EPEL-2021-693fe98840)
Open source remote desktop protocol (RDP) server
--------------------------------------------------------------------------------
Update Information:
Fix bug #1977175.
--------------------------------------------------------------------------------
ChangeLog:
* Wed Jul 14 2021 Bojan Smojver <bojan(a)rexurive.com> - 1:0.9.16-2
- Bring logrotate file in line with defaults (BZ #1977175).
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1977175 - Default log rotation too fast
https://bugzilla.redhat.com/show_bug.cgi?id=1977175
--------------------------------------------------------------------------------
On Fri, Jun 18, 2021 at 05:30:28PM +0200, Nils Philippsen wrote:
> Hi everybody,
>
> rpmautospec[1] is now deployed on the Koji builders. It took a little
> longer than expected, but went smoothly otherwise—at most, you should
> have noticed any currently running builds of yours being restarted
> when we restarted the kojid processes.
>
> We invite you to use automatic releases and changelogs in your RPM
> packages from now on, refer to [2] for details. Please hit us up on
> #fedora-apps (on Libera.chat) if you have questions. If you encounter
> any issues, please file them in the project tracker[3].
>
Now that this is in the Koji builders... would this be sufficient to
have it enabled for EPEL8 specs as well?
- branch and build python-rpmautospec for EPEL8
- add Requires: rpmautospec-rpm-macros to epel-rpm-macros in EPEL8
Given that EPEL8 will be around for a while, it sounds like it would be
of benefits if we can keep the same spec between Rawhide and it. e.g.
python-TestSlide now uses rpmautospec in the Rawhide branch, and so any
update in EPEL8 will have to diverge.
cc:ing the EPEL devel list so we can discuss if we want to do this
Thanks,
--
Michel Alexandre Salim
profile: https://keyoxide.org/michel@michel-slm.name
Hi, I see Neovim 0.5 stable has come to Fedora 34. Is it possible it could be released for EPEL8? Thanks.
At the moment there is only a very old version:
```
Available Packages
Name : neovim
Version : 0.3.8
Release : 1.el8.1
Architecture : x86_64
Size : 5.1 M
Source : neovim-0.3.8-1.el8.1.src.rpm
Repository : epel
Summary : Vim-fork focused on extensibility and agility
URL : http://neovim.io
License : ASL 2.0
Description : Neovim is a refactor - and sometimes redactor - in the tradition of
: Vim, which itself derives from Stevie. It is not a rewrite, but a
: continuation and extension of Vim. Many rewrites, clones, emulators
: and imitators exist; some are very clever, but none are Vim. Neovim
: strives to be a superset of Vim, notwithstanding some intentionally
: removed misfeatures; excepting those few and carefully-considered
: excisions, Neovim is Vim. It is built for users who want the good
: parts of Vim, without compromise, and more.
```
Dear all,
You are kindly invited to the meeting:
EPEL Steering Committee on 2021-07-14 from 16:00:00 to 17:00:00 US/Eastern
At fedora-meeting(a)irc.libera.chat
The meeting will be about:
This is the weekly EPEL Steering Committee Meeting.
A general agenda is the following:
#meetingname EPEL
#topic Intros
#topic Old Business
#topic EPEL-7
#topic EPEL-8
#topic EPEL-9
#topic Openfloor
#endmeeting
Source: https://calendar.fedoraproject.org//meeting/9854/
The following Fedora EPEL 7 Security updates need testing:
Age URL
44 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-1f259a45ef openjpeg2-2.3.1-11.el7
11 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-bd790583ee seamonkey-2.53.8-1.el7
8 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-4cfaa8ab63 djvulibre-3.5.25.3-24.el7
The following builds have been pushed to Fedora EPEL 7 updates-testing
doctest-2.4.6-3.el7
opendmarc-1.4.1.1-3.el7
unrealircd-5.2.1-1.el7
Details about builds:
================================================================================
doctest-2.4.6-3.el7 (FEDORA-EPEL-2021-6c9d74216d)
Feature-rich header-only C++ testing framework
--------------------------------------------------------------------------------
Update Information:
resolves FTFBS https://bugzilla.redhat.com/show_bug.cgi?id=1981037
--------------------------------------------------------------------------------
ChangeLog:
* Sat Jul 10 2021 Nick Black <dankamongmen(a)gmail.com> - 2.4.6-3
- Patch out -Werror to remedy FTBFS
* Sat Jun 26 2021 Nick Black <dankamongmen(a)gmail.com> - 2.4.6-1
- New upstream release
* Sun Jun 20 2021 Benjamin A. Beasley <code(a)musicinmybrain.net> - 2.4.5-3
- The virtual Provides for doctest-static is no longer arched
* Thu Feb 18 2021 Nick Black <dankamongmen(a)gmail.com> - 2.4.5-2
- Add my patch to work around recent libc blues
--------------------------------------------------------------------------------
================================================================================
opendmarc-1.4.1.1-3.el7 (FEDORA-EPEL-2021-ddb4fcb22a)
A Domain-based Message Authentication, Reporting & Conformance (DMARC) milter and library
--------------------------------------------------------------------------------
Update Information:
Fix for CVE-2021-34555 as well as fix for using /var in service file warning.
--------------------------------------------------------------------------------
ChangeLog:
* Sun Jul 11 2021 Kevin Fenzi <kevin(a)scrye.com> - 1.4.1.1-3
- Fix use of /var/run in service file. Fixes rhbz#1915468
* Sun Jul 11 2021 Kevin Fenzi <kevin(a)scrye.com> - 1.4.1.1-2
- Add patch for CVE-2021-34555. Fixes rhbz#1974707
* Sat Jun 19 2021 Kevin Fenzi <kevin(a)scrye.com> - 1.4.1.1-1
- Update to 1.4.1.1. Fixes rhbz#1972292
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1915468 - /usr/lib/systemd/system/opendmarc.service:8: PIDFile= references a path below legacy directory /var/run/, updating /var/run/opendmarc/opendmarc.pid ��� /run/opendmarc/opendmarc.pid; please update the unit file accordingly.
https://bugzilla.redhat.com/show_bug.cgi?id=1915468
[ 2 ] Bug #1974710 - CVE-2021-34555 opendmarc: remote NULL pointer dereference may lead to a DoS [fedora-34]
https://bugzilla.redhat.com/show_bug.cgi?id=1974710
--------------------------------------------------------------------------------
================================================================================
unrealircd-5.2.1-1.el7 (FEDORA-EPEL-2021-a381126c38)
Open Source IRC server
--------------------------------------------------------------------------------
Update Information:
UnrealIRCd 5.2.1 ================ Enhancements ------------ * The allow
block now uses `allow::mask` instead of `allow::ip` and `allow::hostname`. Users
upgrading will receive a warning but the server will continue to boot. * New
documentation for mask items in the configuration file to show how it works with
1 or more mask items in a block. Also support for negative matching has been
improved and we now support extended server ban syntax. * Combining the new
options from above you can do things like: * `allow { mask ~a:TrustedUser;
class flooders; maxperip 100; }` If TrustedUser authenticates to services using
SASL then he gets in the special class "flooders" with a maxperip of 100. *
`allow { mask { ~S:112233etc; ~S:anotherone; }; class clients; maxperip 10; }`
Users matching one of these certificate fingerprints get a high maximum per ip
of 10. * New block `set::server-linking` * For link blocks with
autoconnect we now default to the strategy 'sequential', meaning we will try the
1st link block first, then the 2nd, then the 3rd, then the 1st again, etc. *
We now have different and lower timeouts for the connect and the handshake. So
we give up a bit more early on servers that are currently down or extremely
lagged. * New security-group block item called `include-mask`. This can be
used to put clients matching a mask into a security group. * New option `lag-
penalty` and `lag-penalty-bytes` in the `set::anti-flood` block. * known-
users can now executes commands at a slightly faster rate than unknown-users.
* It can further be used to allow really trusted users/bots to execute commands
at even higher rates, such as 20 commands per second, without making them IRCOp.
This explained in FAQ: How to allow users to send more commands per second. *
The `REHASH` command is now sufficient to reload SSL/TLS certificates. You no
longer need to use `REHASH -tls`. The same is true for `unrealircdctl rehash`
which now also does the extra steps in `unrealircdctl reloadtls`. The commands
will stay, though, in case you only want to reload the TLS certificates and not
rehash the entire configuration file. * Support for OpenSSL 3.0.0 * Show
microseconds in `TSCTL ALLTIME` * The git version id is now shown in the
`INFO` command on *NIX (ReleaseId). * Extban `~a:*` now matches all
authenticated users and `~a:0` matches all unauthenticated users. * Allow
multiple masks in the `deny link { }` block Fixes ----- * When using
persistent channel history: if you had ANY rehash error (often completely
unrelated to channel history) and you then rehashed again UnrealIRCd would
crash. * When server syncing larger channels we could accidentally skip over
or forget to send a few users. These users would then not be shown on the other
side of the link but are actually in the channel (ghosts) * When using
autoconnect on (very) big networks, the network no longer breaks down (with the
new default strategy 'sequential') * The default ban exemption on `127.*` was
too broad. It also matched hostnames that started with it, allowing such users
to bypass gline/kline/shun (but not zline/gzline). * Channel mode `+d` (so
after `-D`) never took QUITs into account properly. This should now fix things,
so the channel goes `-d` immediately once it is no longer needed. * Give a
better error message when trying to use an unconfirmed account with authprompt.
Module coders / IRC protocol ---------------------------- * We now assume all
services set the SVID field. If your services only sets umode `+r` and does not
use `SVSLOGIN` or `SVSMODE nick +d SVID` then users will not be recognized as
authenticated anymore. * In the `UID` command we now validate the UID
(parameter 6) to start with the SID and contains digits and uppercase only. *
Servers can no longer change moddata of remote clients. That is, it is disabled
by default, but modules can still allow it for certain moddata via
`mreq.remote_write=1`. You can use `#if UNREAL_VERSION_TIME >= 202125` to detect
if this new `.remote_write` option is available. * Removed `HCN` from 005,
since nobody uses this anyway.
--------------------------------------------------------------------------------
ChangeLog:
* Fri Jul 9 2021 Robert Scheck <robert(a)fedoraproject.org> 5.2.1-1
- Upgrade to 5.2.1 (#1978927)
* Fri Jun 25 2021 Robert Scheck <robert(a)fedoraproject.org> 5.2.0.2-1
- Upgrade to 5.2.0.2 (#1976246)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1978927 - unrealircd-5.2.1.1 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1978927
--------------------------------------------------------------------------------
The following Fedora EPEL 8 Security updates need testing:
Age URL
11 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-f77315a931 seamonkey-2.53.8-1.el8
9 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-d4c3bbff96 libolm-3.2.4-2.el8
9 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-15c5b7660c suricata-5.0.7-1.el8
9 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-ac096c00b0 libtpms-0.8.4-0.20210624gita594c4692a.el8.1
1 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-f971d08ec9 chromium-91.0.4472.114-2.el8
The following builds have been pushed to Fedora EPEL 8 updates-testing
doctest-2.4.6-3.el8
et-6.1.8-1.el8
opendmarc-1.4.1.1-3.el8
unrealircd-5.2.1-1.el8
Details about builds:
================================================================================
doctest-2.4.6-3.el8 (FEDORA-EPEL-2021-8e82f65b20)
Feature-rich header-only C++ testing framework
--------------------------------------------------------------------------------
Update Information:
resolves FTFBS https://bugzilla.redhat.com/show_bug.cgi?id=1981037
--------------------------------------------------------------------------------
ChangeLog:
* Sat Jul 10 2021 Nick Black <dankamongmen(a)gmail.com> - 2.4.6-3
- Patch out -Werror to remedy FTBFS
* Sat Jun 26 2021 Nick Black <dankamongmen(a)gmail.com> - 2.4.6-1
- New upstream release
* Sun Jun 20 2021 Benjamin A. Beasley <code(a)musicinmybrain.net> - 2.4.5-3
- The virtual Provides for doctest-static is no longer arched
* Thu Feb 18 2021 Nick Black <dankamongmen(a)gmail.com> - 2.4.5-2
- Add my patch to work around recent libc blues
--------------------------------------------------------------------------------
================================================================================
et-6.1.8-1.el8 (FEDORA-EPEL-2021-1e23f29082)
Remote shell that survives IP roaming and disconnect
--------------------------------------------------------------------------------
Update Information:
SSH config fixes
--------------------------------------------------------------------------------
ChangeLog:
* Sun Jul 11 2021 Michel Alexandre Salim <salimma(a)fedoraproject.org> - 6.1.8-1
- Update to 6.1.8
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1965614 - et-6.1.8 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1965614
--------------------------------------------------------------------------------
================================================================================
opendmarc-1.4.1.1-3.el8 (FEDORA-EPEL-2021-8f073f9e87)
A Domain-based Message Authentication, Reporting & Conformance (DMARC) milter and library
--------------------------------------------------------------------------------
Update Information:
Fix for CVE-2021-34555 as well as fix for using /var in service file warning.
--------------------------------------------------------------------------------
ChangeLog:
* Sun Jul 11 2021 Kevin Fenzi <kevin(a)scrye.com> - 1.4.1.1-3
- Fix use of /var/run in service file. Fixes rhbz#1915468
* Sun Jul 11 2021 Kevin Fenzi <kevin(a)scrye.com> - 1.4.1.1-2
- Add patch for CVE-2021-34555. Fixes rhbz#1974707
* Sat Jun 19 2021 Kevin Fenzi <kevin(a)scrye.com> - 1.4.1.1-1
- Update to 1.4.1.1. Fixes rhbz#1972292
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1915468 - /usr/lib/systemd/system/opendmarc.service:8: PIDFile= references a path below legacy directory /var/run/, updating /var/run/opendmarc/opendmarc.pid ��� /run/opendmarc/opendmarc.pid; please update the unit file accordingly.
https://bugzilla.redhat.com/show_bug.cgi?id=1915468
[ 2 ] Bug #1974710 - CVE-2021-34555 opendmarc: remote NULL pointer dereference may lead to a DoS [fedora-34]
https://bugzilla.redhat.com/show_bug.cgi?id=1974710
--------------------------------------------------------------------------------
================================================================================
unrealircd-5.2.1-1.el8 (FEDORA-EPEL-2021-293195e59b)
Open Source IRC server
--------------------------------------------------------------------------------
Update Information:
UnrealIRCd 5.2.1 ================ Enhancements ------------ * The allow
block now uses `allow::mask` instead of `allow::ip` and `allow::hostname`. Users
upgrading will receive a warning but the server will continue to boot. * New
documentation for mask items in the configuration file to show how it works with
1 or more mask items in a block. Also support for negative matching has been
improved and we now support extended server ban syntax. * Combining the new
options from above you can do things like: * `allow { mask ~a:TrustedUser;
class flooders; maxperip 100; }` If TrustedUser authenticates to services using
SASL then he gets in the special class "flooders" with a maxperip of 100. *
`allow { mask { ~S:112233etc; ~S:anotherone; }; class clients; maxperip 10; }`
Users matching one of these certificate fingerprints get a high maximum per ip
of 10. * New block `set::server-linking` * For link blocks with
autoconnect we now default to the strategy 'sequential', meaning we will try the
1st link block first, then the 2nd, then the 3rd, then the 1st again, etc. *
We now have different and lower timeouts for the connect and the handshake. So
we give up a bit more early on servers that are currently down or extremely
lagged. * New security-group block item called `include-mask`. This can be
used to put clients matching a mask into a security group. * New option `lag-
penalty` and `lag-penalty-bytes` in the `set::anti-flood` block. * known-
users can now executes commands at a slightly faster rate than unknown-users.
* It can further be used to allow really trusted users/bots to execute commands
at even higher rates, such as 20 commands per second, without making them IRCOp.
This explained in FAQ: How to allow users to send more commands per second. *
The `REHASH` command is now sufficient to reload SSL/TLS certificates. You no
longer need to use `REHASH -tls`. The same is true for `unrealircdctl rehash`
which now also does the extra steps in `unrealircdctl reloadtls`. The commands
will stay, though, in case you only want to reload the TLS certificates and not
rehash the entire configuration file. * Support for OpenSSL 3.0.0 * Show
microseconds in `TSCTL ALLTIME` * The git version id is now shown in the
`INFO` command on *NIX (ReleaseId). * Extban `~a:*` now matches all
authenticated users and `~a:0` matches all unauthenticated users. * Allow
multiple masks in the `deny link { }` block Fixes ----- * When using
persistent channel history: if you had ANY rehash error (often completely
unrelated to channel history) and you then rehashed again UnrealIRCd would
crash. * When server syncing larger channels we could accidentally skip over
or forget to send a few users. These users would then not be shown on the other
side of the link but are actually in the channel (ghosts) * When using
autoconnect on (very) big networks, the network no longer breaks down (with the
new default strategy 'sequential') * The default ban exemption on `127.*` was
too broad. It also matched hostnames that started with it, allowing such users
to bypass gline/kline/shun (but not zline/gzline). * Channel mode `+d` (so
after `-D`) never took QUITs into account properly. This should now fix things,
so the channel goes `-d` immediately once it is no longer needed. * Give a
better error message when trying to use an unconfirmed account with authprompt.
Module coders / IRC protocol ---------------------------- * We now assume all
services set the SVID field. If your services only sets umode `+r` and does not
use `SVSLOGIN` or `SVSMODE nick +d SVID` then users will not be recognized as
authenticated anymore. * In the `UID` command we now validate the UID
(parameter 6) to start with the SID and contains digits and uppercase only. *
Servers can no longer change moddata of remote clients. That is, it is disabled
by default, but modules can still allow it for certain moddata via
`mreq.remote_write=1`. You can use `#if UNREAL_VERSION_TIME >= 202125` to detect
if this new `.remote_write` option is available. * Removed `HCN` from 005,
since nobody uses this anyway.
--------------------------------------------------------------------------------
ChangeLog:
* Fri Jul 9 2021 Robert Scheck <robert(a)fedoraproject.org> 5.2.1-1
- Upgrade to 5.2.1 (#1978927)
* Fri Jun 25 2021 Robert Scheck <robert(a)fedoraproject.org> 5.2.0.2-1
- Upgrade to 5.2.0.2 (#1976246)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1978927 - unrealircd-5.2.1.1 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1978927
--------------------------------------------------------------------------------
Hi,
I'm working on a tool to make it easier to create EPEL branch requests
in the case where there are transitive dependencies that also need to
be branched.
I'm basing it on https://fedoraproject.org/wiki/Getting_a_Fedora_package_in_EPEL
which provides some guidelines and some templates; however, it is a bit
vague on some aspects, namely:
which product and component should the bug be filed against?
I've been using Fedora/rawhide (with the FutureFeature keyword) if the package
has never been branched for EPEL before, and 'Fedora EPEL' / epelX (where X is
the branch requested) if it has, however, I can't find a written document where
this is recommended, though I thought I've read it somewhere in the past.
If I can simply use Fedora/rawhide, this would simplify the tool a lot:
- we can almost always assume there is a {'product: 'Fedora', 'component': srpm}
with some rare exceptions e.g. the srpm is in base CentOS but has missing
subpackages (see recent discussion on the topic)
- if the package is branched for EPEL at some point, we can file the request
against {'product': 'Fedora EPEL', 'component': srpm}. But what version to file
against?
- bpython: https://bugzilla.redhat.com/show_bug.cgi?id=1782782
phoronix-test-suite: https://bugzilla.redhat.com/show_bug.cgi?id=1976280
these are the ideal cases; the request is for an 'epel8' branch and 'epel7' and
'epel8' are listed as available versions, so the request was filed against 'epel8'
- nextcloud-client: https://bugzilla.redhat.com/show_bug.cgi?id=1972910
this is a request for 'epel8-next', but that is not available as a product
The tool will thus need to query Bugzilla to locate the component on either
Fedora EPEL or Fedora, and then figure out what versions are listed; from my
initial experimentation with python-bugzilla: https://github.com/python-bugzilla/python-bugzilla
this does not seem trivial.
If filing against Fedora/rawhide is fine, I can edit the wiki to match. It should
probably also mention that the EPEL Packagers SIG group can be added as a co-maintainer,
but I'll experiment with the wording first when testing the tool.
Thanks,
--
Michel Alexandre Salim
profile: https://keyoxide.org/michel@michel-slm.name
The following Fedora EPEL 8 Security updates need testing:
Age URL
10 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-f77315a931 seamonkey-2.53.8-1.el8
8 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-d4c3bbff96 libolm-3.2.4-2.el8
8 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-15c5b7660c suricata-5.0.7-1.el8
8 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-ac096c00b0 libtpms-0.8.4-0.20210624gita594c4692a.el8.1
1 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-f971d08ec9 chromium-91.0.4472.114-2.el8
The following builds have been pushed to Fedora EPEL 8 updates-testing
ansible-collection-community-general-3.3.2-1.el8
xrootd-5.3.0-1.el8
Details about builds:
================================================================================
ansible-collection-community-general-3.3.2-1.el8 (FEDORA-EPEL-2021-86004cd93c)
Modules and plugins supported by Ansible community
--------------------------------------------------------------------------------
Update Information:
Update to 3.3.2 with a number of bugfixes.
--------------------------------------------------------------------------------
ChangeLog:
* Sat Jul 10 2021 Kevin Fenzi <kevin(a)scrye.com> - 3.3.2-1
- Update to 3.3.2. Fixes rhbz#1977438
* Tue Jun 8 2021 Kevin Fenzi <kevin(a)scrye.com> - 3.2.0-1
- Update to 3.2.0. Fixes rhbz#1969570
--------------------------------------------------------------------------------
================================================================================
xrootd-5.3.0-1.el8 (FEDORA-EPEL-2021-007d01878c)
Extended ROOT file server
--------------------------------------------------------------------------------
Update Information:
xrootd 53.0
--------------------------------------------------------------------------------
ChangeLog:
* Fri Jul 9 2021 Mattias Ellert <mattias.ellert(a)physics.uu.se> - 1:5.3.0-1
- Update to version 5.3.0
* Fri Jun 4 2021 Python Maint <python-maint(a)redhat.com> - 1:5.2.0-2
- Rebuilt for Python 3.10
--------------------------------------------------------------------------------