The following Fedora EPEL 6 Security updates need testing:
Age URL
759
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2012-5620/bugzilla-3....
106
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-0440/fwsnort-1.6...
91
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-0590/oath-toolki...
50
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1011/php-ZendFra...
8
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1379/seamonkey-2...
8
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1388/botan-1.8.1...
4
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1414/gajim-0.14....
4
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1434/Django14-1....
1
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1452/php-ZendFra...
0
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1471/chicken-4.8...
The following builds have been pushed to Fedora EPEL 6 updates-testing
chicken-4.8.0.6-2.el6
Details about builds:
================================================================================
chicken-4.8.0.6-2.el6 (FEDORA-EPEL-2014-1471)
A practical and portable Scheme system
--------------------------------------------------------------------------------
Update Information:
Fix for CVE-2014-3776 and bump to 4.8.0.6. Latest upstream release.
--------------------------------------------------------------------------------
ChangeLog:
* Tue May 20 2014 Ricky Elrod <codeblock(a)fedoraproject.org> - 4.8.0.6-2
- Patch for CVE-2014-3776.
* Thu Apr 24 2014 Ricky Elrod <codeblock(a)fedoraproject.org> - 4.8.0.6-1
- Upstream 4.8.0.6.
* Sat Dec 14 2013 Ricky Elrod <codeblock(a)fedoraproject.org> - 4.8.0.5-3
- Get rid of docs subpackage.
- Add a -libs subpackage for the runtime library.
* Sun Dec 8 2013 Ricky Elrod <codeblock(a)fedoraproject.org> - 4.8.0.5-2
- Add -Wformat for BZ #1037013.
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1099613 - CVE-2014-3776 chicken: buffer overflow in
"read-u8vector!" procedure leads to DoS or arbitrary code exec
https://bugzilla.redhat.com/show_bug.cgi?id=1099613
--------------------------------------------------------------------------------