The following Fedora EPEL 8 Security updates need testing:
Age URL
2
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-7f0ce51dbd
python-bleach-3.1.4-2.el8
The following builds have been pushed to Fedora EPEL 8 updates-testing
amavisd-milter-1.7.0-1.el8
batctl-2020.1-1.el8
boinc-client-7.16.6-3.el8
chromium-81.0.4044.122-1.el8
fldigi-4.1.12-1.el8
libgdiplus-6.0.4-2.el8
openvpn-2.4.9-1.el8
perl-B-COW-0.004-2.el8
perl-Parse-EDID-1.0.7-5.el8
pgbouncer-1.12.0-5.el8
pxz-4.999.9-19.beta.20200421git.el8
tcl-tclxml-3.2-26.el8
twa-1.9.1-1.el8
Details about builds:
================================================================================
amavisd-milter-1.7.0-1.el8 (FEDORA-EPEL-2020-442d0a579d)
Sendmail milter for amavisd-new using the AM.PDP protocol
--------------------------------------------------------------------------------
Update Information:
# amavisd-milter amavisd-milter has been moved from SourceForge to to GitHub.
## New features - Fork after initializing milter socket - Use `client_name`
if available instead of hostname passed to `xxfi_connect` - Generate `amavisd-
milter.8` from `AMAVISD-MILTER.md` # Bug and compatibility fixes - Fixed
compiler warnings - Converted indentation to spaces only - Removed obsoleted
file `amavisd-milter.spec`
--------------------------------------------------------------------------------
ChangeLog:
* Wed Apr 22 2020 Robert Scheck <robert(a)fedoraproject.org> 1.7.0-1
- Upgrade to 1.7.0 (#1824332)
* Tue Jan 28 2020 Fedora Release Engineering <releng(a)fedoraproject.org> - 1.6.1-6
- Rebuilt for
https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1824332 - amavisd-milter 1.7.0 available
https://bugzilla.redhat.com/show_bug.cgi?id=1824332
--------------------------------------------------------------------------------
================================================================================
batctl-2020.1-1.el8 (FEDORA-EPEL-2020-83ac0508a4)
B.A.T.M.A.N. advanced control and management tool
--------------------------------------------------------------------------------
Update Information:
Update to 2020.1
--------------------------------------------------------------------------------
ChangeLog:
* Fri Apr 24 2020 Felix Kaechele <heffer(a)fedoraproject.org> - 2020.1-1
- update to 2020.1
--------------------------------------------------------------------------------
================================================================================
boinc-client-7.16.6-3.el8 (FEDORA-EPEL-2020-78fe365995)
The BOINC client
--------------------------------------------------------------------------------
Update Information:
Removed broken user idle time detection. If you happen to see "computer in use"
as working unit status, please leave a comment below ---- 7.16.6 release
--------------------------------------------------------------------------------
ChangeLog:
* Thu Apr 23 2020 Germano Massullo <germano.massullo(a)gmail.com> - 7.16.6-3
- Updated disable_idle_time_detection.patch
* Sat Apr 11 2020 Germano Massullo <germano.massullo(a)gmail.com> - 7.16.6-2
- Added disable_idle_time_detection.patch
* Thu Apr 9 2020 Germano Massullo <germano.massullo(a)gmail.com> - 7.16.1-7
- 7.16.6 release
- Removed cc_config_cpp_3249.patch
- Disabled disabled_idle_detection.patch. Read
https://bugzilla.redhat.com/show_bug.cgi?id=1822723
* Tue Jan 28 2020 Fedora Release Engineering <releng(a)fedoraproject.org> - 7.16.1-6
- Rebuilt for
https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1822723 - Disable idle time detection
https://bugzilla.redhat.com/show_bug.cgi?id=1822723
--------------------------------------------------------------------------------
================================================================================
chromium-81.0.4044.122-1.el8 (FEDORA-EPEL-2020-72116e7775)
A WebKit (Blink) powered web browser
--------------------------------------------------------------------------------
Update Information:
Will Chromium stop releasing updates long enough for one to make it to EPEL
stable? Probably not. This one fixes: CVE-2020-6458 CVE-2020-6459
CVE-2020-6460 ---- Fix dependency issue introduced when switching from a
"shared" build to a "static" build. ---- A new major version of
Chromium
without any security bugs! Just kidding. Here's the CVE list: CVE-2020-6454
CVE-2020-6423 CVE-2020-6455 CVE-2020-6430 CVE-2020-6456 CVE-2020-6431
CVE-2020-6433 CVE-2020-6434 CVE-2020-6435 CVE-2020-6436 CVE-2020-6437
CVE-2020-6438 CVE-2020-6439 CVE-2020-6440 CVE-2020-6441 CVE-2020-6442
CVE-2020-6443 CVE-2020-6444 CVE-2020-6445 CVE-2020-6446 CVE-2020-6447
CVE-2020-6448 CVE-2020-6432 CVE-2020-6457 Oh, and this build switches over to a
static build, so the chromium-libs and chromium-libs-media subpackages are now
obsolete, but it should be slightly better for performance. ---- Bugfix
release from Google for 80.0.3987.162. ---- Update to 80.0.3987.162. Fixes the
following CVEs: * CVE-2020-6450 * CVE-2020-6451 ��� CVE-2020-6452 ---- Update
to 80.0.3987.149. Upstream says it fixes "13" security issues, but only lists
these CVEs: * CVE-2020-6422: Use after free in WebGL * CVE-2020-6424: Use after
free in media * CVE-2020-6425: Insufficient policy enforcement in extensions. *
CVE-2020-6426: Inappropriate implementation in V8 * CVE-2020-6427: Use after
free in audio * CVE-2020-6428: Use after free in audio * CVE-2020-6429: Use
after free in audio. * CVE-2019-20503: Out of bounds read in usersctplib. *
CVE-2020-6449: Use after free in audio ---- Update to 80.0.3987.132. Lots of
security fixes here. VAAPI re-enabled by default (except on nvidia). List of
CVEs fixed (since last update): * CVE-2019-20446 * CVE-2020-6381 *
CVE-2020-6382 * CVE-2020-6383 * CVE-2020-6384 * CVE-2020-6385 * CVE-2020-6386
* CVE-2020-6387 * CVE-2020-6388 * CVE-2020-6389 * CVE-2020-6390 *
CVE-2020-6391 * CVE-2020-6392 * CVE-2020-6393 * CVE-2020-6394 * CVE-2020-6395 *
CVE-2020-6396 * CVE-2020-6397 * CVE-2020-6398 * CVE-2020-6399 * CVE-2020-6400
* CVE-2020-6401 * CVE-2020-6402 * CVE-2020-6403 * CVE-2020-6404 *
CVE-2020-6405 * CVE-2020-6406 * CVE-2020-6407 * CVE-2020-6408 * CVE-2020-6409
* CVE-2020-6410 * CVE-2020-6411 * CVE-2020-6412 * CVE-2020-6413 *
CVE-2020-6414 * CVE-2020-6415 * CVE-2020-6416 * CVE-2020-6417 * CVE-2020-6418
* CVE-2020-6420
--------------------------------------------------------------------------------
ChangeLog:
* Thu Apr 23 2020 Tom Callaway <spot(a)fedoraproject.org> - 81.0.4044.122-1
- update to 81.0.4044.122
* Tue Apr 21 2020 Tom Callaway <spot(a)fedoraproject.org> - 81.0.4044.113-2
- add explicit Requires: chromium-common
* Thu Apr 16 2020 Tom Callaway <spot(a)fedoraproject.org> - 81.0.4044.113-1
- update to 81.0.4044.113
* Mon Apr 13 2020 Tom Callaway <spot(a)fedoraproject.org> - 81.0.4044.92-1
- update to 81.0.4044.92
- squelch the selinux output in the post scriptlet
- add Provides/Obsoletes in case we're build with shared set to 0
- add ulimit -n 4096 (needed for static builds, probably not harmful for shared builds
either)
- do static build
* Sat Apr 4 2020 Tom Callaway <spot(a)fedoraproject.org> - 80.0.3987.163-1
- update to 80.0.3987.163
* Wed Apr 1 2020 Tom Callaway <spot(a)fedoraproject.org> - 80.0.3987.162-1
- update to 80.0.3987.162
* Wed Mar 18 2020 Tom Callaway <spot(a)fedoraproject.org> - 80.0.3987.149-1
- update to 80.0.3987.149
* Thu Feb 27 2020 Tom Callaway <spot(a)fedoraproject.org> - 80.0.3987.132-1
- update to 80.0.3987.132
- disable C++17 changes (this means f32+ will no longer build, but it segfaulted
immediately)
* Thu Feb 27 2020 Tom Callaway <spot(a)fedoraproject.org> - 80.0.3987.122-1
- update to 80.0.3987.122
* Mon Feb 17 2020 Tom Callaway <spot(a)fedoraproject.org> - 80.0.3987.106-1
- update to 80.0.3987.106
* Wed Feb 5 2020 Tom Callaway <spot(a)fedoraproject.org> - 80.0.3987.87-1
- update to 80.0.3987.87
* Tue Jan 28 2020 Fedora Release Engineering <releng(a)fedoraproject.org> -
79.0.3945.130-2
- Rebuilt for
https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1797608 - CVE-2019-20446 librsvg: Resource exhaustion via crafted SVG file
with nested patterns
https://bugzilla.redhat.com/show_bug.cgi?id=1797608
[ 2 ] Bug #1801160 - CVE-2020-6381 chromium-browser: Integer overflow in JavaScript
https://bugzilla.redhat.com/show_bug.cgi?id=1801160
[ 3 ] Bug #1801161 - CVE-2020-6382 chromium-browser: Type Confusion in JavaScript
https://bugzilla.redhat.com/show_bug.cgi?id=1801161
[ 4 ] Bug #1801162 - CVE-2020-6385 chromium-browser: Insufficient policy enforcement in
storage
https://bugzilla.redhat.com/show_bug.cgi?id=1801162
[ 5 ] Bug #1801163 - CVE-2020-6387 chromium-browser: Out of bounds write in WebRTC
https://bugzilla.redhat.com/show_bug.cgi?id=1801163
[ 6 ] Bug #1801164 - CVE-2020-6388 chromium-browser: Out of bounds memory access in
WebAudio
https://bugzilla.redhat.com/show_bug.cgi?id=1801164
[ 7 ] Bug #1801165 - CVE-2020-6389 chromium-browser: Out of bounds write in WebRTC
https://bugzilla.redhat.com/show_bug.cgi?id=1801165
[ 8 ] Bug #1801166 - CVE-2020-6390 chromium-browser: Out of bounds memory access in
streams
https://bugzilla.redhat.com/show_bug.cgi?id=1801166
[ 9 ] Bug #1801167 - CVE-2020-6391 chromium-browser: Insufficient validation of
untrusted input in Blink
https://bugzilla.redhat.com/show_bug.cgi?id=1801167
[ 10 ] Bug #1801168 - CVE-2020-6392 chromium-browser: Insufficient policy enforcement in
extensions
https://bugzilla.redhat.com/show_bug.cgi?id=1801168
[ 11 ] Bug #1801169 - CVE-2020-6393 chromium-browser: Insufficient policy enforcement in
Blink
https://bugzilla.redhat.com/show_bug.cgi?id=1801169
[ 12 ] Bug #1801170 - CVE-2020-6394 chromium-browser: Insufficient policy enforcement in
Blink
https://bugzilla.redhat.com/show_bug.cgi?id=1801170
[ 13 ] Bug #1801171 - CVE-2020-6395 chromium-browser: Out of bounds read in JavaScript
https://bugzilla.redhat.com/show_bug.cgi?id=1801171
[ 14 ] Bug #1801172 - CVE-2020-6396 chromium-browser: Inappropriate implementation in
Skia
https://bugzilla.redhat.com/show_bug.cgi?id=1801172
[ 15 ] Bug #1801173 - CVE-2020-6397 chromium-browser: Incorrect security UI in sharing
https://bugzilla.redhat.com/show_bug.cgi?id=1801173
[ 16 ] Bug #1801174 - CVE-2020-6398 chromium-browser: Uninitialized use in PDFium
https://bugzilla.redhat.com/show_bug.cgi?id=1801174
[ 17 ] Bug #1801175 - CVE-2020-6399 chromium-browser: Insufficient policy enforcement in
AppCache
https://bugzilla.redhat.com/show_bug.cgi?id=1801175
[ 18 ] Bug #1801176 - CVE-2020-6400 chromium-browser: Inappropriate implementation in
CORS
https://bugzilla.redhat.com/show_bug.cgi?id=1801176
[ 19 ] Bug #1801177 - CVE-2020-6401 chromium-browser: Insufficient validation of
untrusted input in Omnibox
https://bugzilla.redhat.com/show_bug.cgi?id=1801177
[ 20 ] Bug #1801178 - CVE-2020-6402 chromium-browser: Insufficient policy enforcement in
downloads
https://bugzilla.redhat.com/show_bug.cgi?id=1801178
[ 21 ] Bug #1801179 - CVE-2020-6403 chromium-browser: Incorrect security UI in Omnibox
https://bugzilla.redhat.com/show_bug.cgi?id=1801179
[ 22 ] Bug #1801180 - CVE-2020-6404 chromium-browser: Inappropriate implementation in
Blink
https://bugzilla.redhat.com/show_bug.cgi?id=1801180
[ 23 ] Bug #1801181 - CVE-2020-6405 sqlite: Out-of-bounds read in SELECT with ON/USING
clause
https://bugzilla.redhat.com/show_bug.cgi?id=1801181
[ 24 ] Bug #1801182 - CVE-2020-6406 chromium-browser: Use after free in audio
https://bugzilla.redhat.com/show_bug.cgi?id=1801182
[ 25 ] Bug #1801184 - CVE-2020-6408 chromium-browser: Insufficient policy enforcement in
CORS
https://bugzilla.redhat.com/show_bug.cgi?id=1801184
[ 26 ] Bug #1801185 - CVE-2020-6409 chromium-browser: Inappropriate implementation in
Omnibox
https://bugzilla.redhat.com/show_bug.cgi?id=1801185
[ 27 ] Bug #1801186 - CVE-2020-6410 chromium-browser: Insufficient policy enforcement in
navigation
https://bugzilla.redhat.com/show_bug.cgi?id=1801186
[ 28 ] Bug #1801187 - CVE-2020-6411 chromium-browser: Insufficient validation of
untrusted input in Omnibox
https://bugzilla.redhat.com/show_bug.cgi?id=1801187
[ 29 ] Bug #1801188 - CVE-2020-6412 chromium-browser: Insufficient validation of
untrusted input in Omnibox
https://bugzilla.redhat.com/show_bug.cgi?id=1801188
[ 30 ] Bug #1801189 - CVE-2020-6413 chromium-browser: Inappropriate implementation in
Blink
https://bugzilla.redhat.com/show_bug.cgi?id=1801189
[ 31 ] Bug #1801190 - CVE-2020-6414 chromium-browser: Insufficient policy enforcement in
Safe Browsing
https://bugzilla.redhat.com/show_bug.cgi?id=1801190
[ 32 ] Bug #1801191 - CVE-2020-6415 chromium-browser: Inappropriate implementation in
JavaScript
https://bugzilla.redhat.com/show_bug.cgi?id=1801191
[ 33 ] Bug #1801192 - CVE-2020-6416 chromium-browser: Insufficient data validation in
streams
https://bugzilla.redhat.com/show_bug.cgi?id=1801192
[ 34 ] Bug #1801193 - CVE-2020-6417 chromium-browser: Inappropriate implementation in
installer
https://bugzilla.redhat.com/show_bug.cgi?id=1801193
[ 35 ] Bug #1807341 - chromium-browser: Out of bounds memory access in streams
https://bugzilla.redhat.com/show_bug.cgi?id=1807341
[ 36 ] Bug #1807343 - CVE-2020-6418 chromium-browser: Type confusion in V8
https://bugzilla.redhat.com/show_bug.cgi?id=1807343
[ 37 ] Bug #1807349 - CVE-2020-10531 ICU: Integer overflow in UnicodeString::doAppend()
https://bugzilla.redhat.com/show_bug.cgi?id=1807349
[ 38 ] Bug #1807381 - CVE-2020-6407 chromium-browser: Out of bounds memory access in
streams
https://bugzilla.redhat.com/show_bug.cgi?id=1807381
[ 39 ] Bug #1807498 - CVE-2020-6383 chromium-browser: Type confusion in V8
https://bugzilla.redhat.com/show_bug.cgi?id=1807498
[ 40 ] Bug #1807499 - CVE-2020-6384 chromium-browser: Use after free in WebAudio
https://bugzilla.redhat.com/show_bug.cgi?id=1807499
[ 41 ] Bug #1807500 - CVE-2020-6386 chromium-browser: Use after free in speech
https://bugzilla.redhat.com/show_bug.cgi?id=1807500
[ 42 ] Bug #1811073 - CVE-2020-6420 chromium-browser: Insufficient policy enforcement in
media
https://bugzilla.redhat.com/show_bug.cgi?id=1811073
[ 43 ] Bug #1815241 - CVE-2020-6424 chromium-browser: Use after free in media
https://bugzilla.redhat.com/show_bug.cgi?id=1815241
[ 44 ] Bug #1815242 - CVE-2020-6425 chromium-browser: Insufficient policy enforcement in
extensions
https://bugzilla.redhat.com/show_bug.cgi?id=1815242
[ 45 ] Bug #1815243 - CVE-2020-6426 chromium-browser: Inappropriate implementation in
V8
https://bugzilla.redhat.com/show_bug.cgi?id=1815243
[ 46 ] Bug #1815244 - CVE-2020-6427 chromium-browser: Use after free in audio
https://bugzilla.redhat.com/show_bug.cgi?id=1815244
[ 47 ] Bug #1815245 - CVE-2020-6428 chromium-browser: Use after free in audio
https://bugzilla.redhat.com/show_bug.cgi?id=1815245
[ 48 ] Bug #1815247 - CVE-2020-6429 chromium-browser: Use after free in audio
https://bugzilla.redhat.com/show_bug.cgi?id=1815247
[ 49 ] Bug #1815248 - CVE-2020-6449 chromium-browser: Use after free in audio
https://bugzilla.redhat.com/show_bug.cgi?id=1815248
[ 50 ] Bug #1815259 - CVE-2020-6422 chromium-browser: Use after free in WebGL
https://bugzilla.redhat.com/show_bug.cgi?id=1815259
[ 51 ] Bug #1820155 - CVE-2020-6450 chromium-browser: Use after free in WebAudio
https://bugzilla.redhat.com/show_bug.cgi?id=1820155
[ 52 ] Bug #1820156 - CVE-2020-6451 chromium-browser: Use after free in WebAudio
https://bugzilla.redhat.com/show_bug.cgi?id=1820156
[ 53 ] Bug #1820157 - CVE-2020-6452 chromium-browser: Heap buffer overflow in media
https://bugzilla.redhat.com/show_bug.cgi?id=1820157
[ 54 ] Bug #1822604 - CVE-2020-6454 chromium-browser: Use after free in extensions
https://bugzilla.redhat.com/show_bug.cgi?id=1822604
[ 55 ] Bug #1822605 - CVE-2020-6423 chromium-browser: Use after free in audio
https://bugzilla.redhat.com/show_bug.cgi?id=1822605
[ 56 ] Bug #1822606 - CVE-2020-6455 chromium-browser: Out of bounds read in WebSQL
https://bugzilla.redhat.com/show_bug.cgi?id=1822606
[ 57 ] Bug #1822607 - CVE-2020-6430 chromium-browser: Type Confusion in V8
https://bugzilla.redhat.com/show_bug.cgi?id=1822607
[ 58 ] Bug #1822608 - CVE-2020-6456 chromium-browser: Insufficient validation of
untrusted input in clipboard
https://bugzilla.redhat.com/show_bug.cgi?id=1822608
[ 59 ] Bug #1822609 - CVE-2020-6431 chromium-browser: Insufficient policy enforcement in
full screen
https://bugzilla.redhat.com/show_bug.cgi?id=1822609
[ 60 ] Bug #1822610 - CVE-2020-6433 chromium-browser: Insufficient policy enforcement in
extensions
https://bugzilla.redhat.com/show_bug.cgi?id=1822610
[ 61 ] Bug #1822611 - CVE-2020-6434 chromium-browser: Use after free in devtools
https://bugzilla.redhat.com/show_bug.cgi?id=1822611
[ 62 ] Bug #1822612 - CVE-2020-6435 chromium-browser: Insufficient policy enforcement in
extensions
https://bugzilla.redhat.com/show_bug.cgi?id=1822612
[ 63 ] Bug #1822613 - CVE-2020-6436 chromium-browser: Use after free in window
management
https://bugzilla.redhat.com/show_bug.cgi?id=1822613
[ 64 ] Bug #1822614 - CVE-2020-6437 chromium-browser: Inappropriate implementation in
WebView
https://bugzilla.redhat.com/show_bug.cgi?id=1822614
[ 65 ] Bug #1822615 - CVE-2020-6438 chromium-browser: Insufficient policy enforcement in
extensions
https://bugzilla.redhat.com/show_bug.cgi?id=1822615
[ 66 ] Bug #1822616 - CVE-2020-6439 chromium-browser: Insufficient policy enforcement in
navigations
https://bugzilla.redhat.com/show_bug.cgi?id=1822616
[ 67 ] Bug #1822617 - CVE-2020-6440 chromium-browser: Inappropriate implementation in
extensions
https://bugzilla.redhat.com/show_bug.cgi?id=1822617
[ 68 ] Bug #1822618 - CVE-2020-6441 chromium-browser: Insufficient policy enforcement in
omnibox
https://bugzilla.redhat.com/show_bug.cgi?id=1822618
[ 69 ] Bug #1822619 - CVE-2020-6442 chromium-browser: Inappropriate implementation in
cache
https://bugzilla.redhat.com/show_bug.cgi?id=1822619
[ 70 ] Bug #1822620 - CVE-2020-6443 chromium-browser: Insufficient data validation in
developer tools
https://bugzilla.redhat.com/show_bug.cgi?id=1822620
[ 71 ] Bug #1822621 - CVE-2020-6444 chromium-browser: Uninitialized use in WebRTC
https://bugzilla.redhat.com/show_bug.cgi?id=1822621
[ 72 ] Bug #1822622 - CVE-2020-6445 chromium-browser: Insufficient policy enforcement in
trusted types
https://bugzilla.redhat.com/show_bug.cgi?id=1822622
[ 73 ] Bug #1822623 - CVE-2020-6446 chromium-browser: Insufficient policy enforcement in
trusted types
https://bugzilla.redhat.com/show_bug.cgi?id=1822623
[ 74 ] Bug #1822624 - CVE-2020-6447 chromium-browser: Inappropriate implementation in
developer tools
https://bugzilla.redhat.com/show_bug.cgi?id=1822624
[ 75 ] Bug #1822625 - CVE-2020-6448 chromium-browser: Use after free in V8
https://bugzilla.redhat.com/show_bug.cgi?id=1822625
[ 76 ] Bug #1824949 - CVE-2020-6457 chromium-browser: Use after free in speech
recognizer
https://bugzilla.redhat.com/show_bug.cgi?id=1824949
[ 77 ] Bug #1827379 - CVE-2020-6459 chromium-browser: Use after free in payments
https://bugzilla.redhat.com/show_bug.cgi?id=1827379
[ 78 ] Bug #1827380 - CVE-2020-6460 chromium-browser: Insufficient data validation in
URL formatting
https://bugzilla.redhat.com/show_bug.cgi?id=1827380
[ 79 ] Bug #1827381 - CVE-2020-6458 chromium-browser: Out of bounds read and write in
PDFium
https://bugzilla.redhat.com/show_bug.cgi?id=1827381
--------------------------------------------------------------------------------
================================================================================
fldigi-4.1.12-1.el8 (FEDORA-EPEL-2020-cb78c04bd9)
Digital modem program for Linux
--------------------------------------------------------------------------------
Update Information:
Thu Apr 23 09:37:00 2020 - Version 4.1.12 TX auto RST-sent * add
control-shift-s for inserting RST sent value in TX stream see
http://www.w1hkj.com/FldigiHelp/keyboard_operation_page.html wwv * fix
segmentation fault on Windows platform Win10 Socket debug * Added event
level recording in socket class CW/DTR/RTS * restore missing Nordic
characters on DTR-CW * enable PTT during CWIO processing * allow user to
calibrate DTR-CW timing at nominal WPM - fractional computed values
rounded to nearest integer i.e. round(0.5) => 1 * update
documentation File/Audio * File selection caused cessation of audio
processing while waiting for user selection. Results in cessation of
signal processing including keep alive signals to flamp and flmsg if
linked. - move all UI interaction to main thread trx testing *
replace compiler macros with in-line code to aid in debugging AFTER macro
* add AFTER tag to repeat macro after a delay of NN seconds CWID button
* One more time to wrestle the wayward CWID button to the mat - fluid
definition file "confdialog.fl" OK - needed to execute "make
flgen" to
create new confdialog.cxx/h files Thank you to all of the testers who helped
bring this version to fruition. 73, David, W1HKJ
--------------------------------------------------------------------------------
ChangeLog:
* Thu Apr 23 2020 Richard Shaw <hobbes1069(a)gmail.com> - 4.1.12-1
- Update to 4.1.12.
* Sat Apr 4 2020 Richard Shaw <hobbes1069(a)gmail.com> - 4.1.11-2
- Rebuild for hamlib 4.0.
--------------------------------------------------------------------------------
================================================================================
libgdiplus-6.0.4-2.el8 (FEDORA-EPEL-2020-26c48600ae)
An Open Source implementation of the GDI+ API
--------------------------------------------------------------------------------
Update Information:
First build for EPEL 8.
--------------------------------------------------------------------------------
ChangeLog:
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1749560 - build of libgdiplus for EPEL 8
https://bugzilla.redhat.com/show_bug.cgi?id=1749560
--------------------------------------------------------------------------------
================================================================================
openvpn-2.4.9-1.el8 (FEDORA-EPEL-2020-b928468862)
A full-featured SSL VPN solution
--------------------------------------------------------------------------------
Update Information:
Update to latest upstream OpenVPN 2.4.9 release. It contains a security fix for
CVE-2020-11810. This security issue is quite hard to abuse, requiring a fairly
precise timing attack combined with guessing a just assigned peer-id reference.
If successful, only a single client just initiating a new connection will
experience a denial of service situation. This wi why the severity is rated
low.
--------------------------------------------------------------------------------
ChangeLog:
* Sun Apr 19 2020 David Sommerseth <dazo(a)eurephia.org> - 2.4.9-1
- Update to upstream OpenVPN 2.4.9
--------------------------------------------------------------------------------
================================================================================
perl-B-COW-0.004-2.el8 (FEDORA-EPEL-2020-eecc5afcda)
Additional B helpers to check Copy On Write status
--------------------------------------------------------------------------------
Update Information:
This is the first EPEL build of perl-B-COW, a module for determining the copy-
on-write status of a variable.
--------------------------------------------------------------------------------
ChangeLog:
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1826270 - Review Request: perl-B-COW - Additional B helpers to check Copy On
Write status
https://bugzilla.redhat.com/show_bug.cgi?id=1826270
--------------------------------------------------------------------------------
================================================================================
perl-Parse-EDID-1.0.7-5.el8 (FEDORA-EPEL-2020-affe217d30)
Extended display identification data (EDID) parser
--------------------------------------------------------------------------------
Update Information:
Add to EPEL 8
--------------------------------------------------------------------------------
ChangeLog:
--------------------------------------------------------------------------------
================================================================================
pgbouncer-1.12.0-5.el8 (FEDORA-EPEL-2020-b464c903b6)
Lightweight connection pooler for PostgreSQL
--------------------------------------------------------------------------------
Update Information:
Update SPEC file (build & runtime requirements, macros, rpmlint fixes, etc.) &
update version for CentOS/RHEL. - Fix dependencies in EPEL 8 - Do not touch in
scriptlets or SysV init script (CentOS/RHEL 6) folders and files already part of
the package - Permissions on the files already part of the package - SELinux
context is wrong i(it's not even in the policy) in the SysV init script and if
needed should be managed with semanage fcontext, not in the script. - The daemon
runs unconfined, so the file context is useless in the SysV init script - Fix
build on RHEL/CentOS 6/7/8. - Do not use a normal home folder and shell for the
user. - Do not remove/change files in the scriptlets. - Do not start in daemon
mode in systemd units. - Trim changelog. - Add template userlist file.
--------------------------------------------------------------------------------
ChangeLog:
* Thu Apr 23 2020 Simone Caronni <negativo17(a)gmail.com> - 1.12.0-5
- Change configuration file permissions and also add a template user list.
* Wed Apr 15 2020 Simone Caronni <negativo17(a)gmail.com> - 1.12.0-4
- Update SPEC file (build & runtime requirements, macros, rpmlint fixes, etc.).
- Fix build on RHEL/CentOS 6/7/8.
- Do not use a normal home folder and shell for the user.
- Do not remove/change files in the scriptlets.
- Do not start in daemon mode in systemd units.
- Trim changelog.
- Merge 1.12.0 from master.
--------------------------------------------------------------------------------
================================================================================
pxz-4.999.9-19.beta.20200421git.el8 (FEDORA-EPEL-2020-1205f64d8d)
Parallel LZMA compressor using XZ
--------------------------------------------------------------------------------
Update Information:
Parallel XZ is a compression utility that takes advantage of running XZ
compression simultaneously on different parts of an input file on multiple cores
and processors. This significantly speeds up compression time.
--------------------------------------------------------------------------------
ChangeLog:
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1766109 - build of pxz / pixz for EPEL 8
https://bugzilla.redhat.com/show_bug.cgi?id=1766109
--------------------------------------------------------------------------------
================================================================================
tcl-tclxml-3.2-26.el8 (FEDORA-EPEL-2020-ed16eaa86b)
XML parsing library for the Tcl scripting language
--------------------------------------------------------------------------------
Update Information:
Initial import.
--------------------------------------------------------------------------------
ChangeLog:
--------------------------------------------------------------------------------
================================================================================
twa-1.9.1-1.el8 (FEDORA-EPEL-2020-003dc7f2d9)
Tiny web auditor with strong opinions
--------------------------------------------------------------------------------
Update Information:
Update to latest upstream release (v.1.9.1)
--------------------------------------------------------------------------------
ChangeLog:
--------------------------------------------------------------------------------