The following Fedora EPEL 4 Security updates need testing:
https://admin.fedoraproject.org/updates/nginx-0.8.55-2.el4
The following builds have been pushed to Fedora EPEL 4 updates-testing
gsoap-2.7.13-4.el4
nginx-0.8.55-2.el4
perl-Pod-Wordlist-hanekomu-1.110090-3.el4
perl-Test-CPAN-Meta-JSON-0.10-2.el4
perl-Test-Mojibake-0.3-2.el4
Details about builds:
================================================================================
gsoap-2.7.13-4.el4 (FEDORA-EPEL-2011-4289)
Generator Tools for Coding SOAP/XML Web Services in C and C++
--------------------------------------------------------------------------------
Update Information:
This update fixes an issue with the IPv6 support in gsoap.
It also adds some man pages.
--------------------------------------------------------------------------------
ChangeLog:
* Sun Aug 28 2011 Mattias Ellert <mattias.ellert(a)fysast.uu.se> - 2.7.13-4
- Update the IPv6 patch
- Add manpages from Debian
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #731834 - gsoap server setting invalid IPV6_V6ONLY option on an IPV4 socket
https://bugzilla.redhat.com/show_bug.cgi?id=731834
--------------------------------------------------------------------------------
================================================================================
nginx-0.8.55-2.el4 (FEDORA-EPEL-2011-4278)
Robust, small and high performance HTTP and reverse proxy server
--------------------------------------------------------------------------------
Update Information:
Update nginx to be a safe version of nginx with respect to an exploit detailed here
https://nealpoole.com/blog/2011/08/possible-arbitrary-code-execution-with...
--------------------------------------------------------------------------------
ChangeLog:
* Mon Aug 29 2011 Jeremy Hinegardner <jeremy at hinegardner dot org> - 0.8.55-2
- update to 0.8.55
- fix bug #717078
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #717078 - nginx: possible arbitrary code execution with null bytes in URI
https://bugzilla.redhat.com/show_bug.cgi?id=717078
--------------------------------------------------------------------------------
================================================================================
perl-Pod-Wordlist-hanekomu-1.110090-3.el4 (FEDORA-EPEL-2011-4280)
Add words for spell checking POD
--------------------------------------------------------------------------------
Update Information:
This is the first EPEL release of perl-Pod-Wordlist-hanekomu.
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #729653 - Review Request: perl-Pod-Wordlist-hanekomu - Add words for spell
checking POD
https://bugzilla.redhat.com/show_bug.cgi?id=729653
--------------------------------------------------------------------------------
================================================================================
perl-Test-CPAN-Meta-JSON-0.10-2.el4 (FEDORA-EPEL-2011-4285)
Validate a META.json file within a CPAN distribution
--------------------------------------------------------------------------------
Update Information:
This is the first EPEL-4 release of perl-Test-CPAN-Meta-JSON.
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #729813 - Review Request: perl-Test-CPAN-Meta-JSON - Validate a META.json file
within a CPAN distribution
https://bugzilla.redhat.com/show_bug.cgi?id=729813
--------------------------------------------------------------------------------
================================================================================
perl-Test-Mojibake-0.3-2.el4 (FEDORA-EPEL-2011-4284)
Check your source for encoding misbehavior
--------------------------------------------------------------------------------
Update Information:
This is the first EPEL release of perl-Test-Mojibake.
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #729972 - Review Request: perl-Test-Mojibake - Check your source for encoding
misbehavior
https://bugzilla.redhat.com/show_bug.cgi?id=729972
--------------------------------------------------------------------------------