The following Fedora EPEL 6 Security updates need testing:
https://admin.fedoraproject.org/updates/asterisk-1.8.4.4-1.el6 https://admin.fedoraproject.org/updates/drupal7-7.4-1.el6 https://admin.fedoraproject.org/updates/wordpress-3.1.4-1.el6 https://admin.fedoraproject.org/updates/dokuwiki-0-0.8.20110525.a.el6 https://admin.fedoraproject.org/updates/mingw32-libpng-1.2.37-3.el6 https://admin.fedoraproject.org/updates/libpng10-1.0.54-3.el6 https://admin.fedoraproject.org/updates/libmodplug-0.8.8.3-2.el6 https://admin.fedoraproject.org/updates/ejabberd-2.1.8-2.el6 https://admin.fedoraproject.org/updates/erlang-R14B-02.1.el6
The following builds have been pushed to Fedora EPEL 6 updates-testing
asterisk-1.8.4.4-1.el6 drupal6-6.22-3.el6 drupal6-feeds-1.0-0.6.beta11.el6 drupal7-7.4-1.el6 naev-0.5.0-3.el6 naev-data-0.5.0-4.el6 python-taboot-0.3.0-1.el6 root-5.28.00e-2.el6 rubygem-gem2rpm-0.7.1-1.el6 swatch-3.2.3-2.el6 wordpress-3.1.4-1.el6
Details about builds:
================================================================================ asterisk-1.8.4.4-1.el6 (FEDORA-EPEL-2011-3678) The Open Source PBX -------------------------------------------------------------------------------- Update Information:
The Asterisk Development Team has announced the release of Asterisk versions 1.4.41.2, 1.6.2.18.2, and 1.8.4.4, which are security releases.
These releases are available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk/releases
The release of Asterisk 1.4.41.2, 1.6.2.18.2, and 1.8.4.4 resolves the following issue:
AST-2011-011: Asterisk may respond differently to SIP requests from an invalid SIP user than it does to a user configured on the system, even when the alwaysauthreject option is set in the configuration. This can leak information about what SIP users are valid on the Asterisk system.
For more information about the details of this vulnerability, please read the security advisory AST-2011-011, which was released at the same time as this announcement.
For a full list of changes in the current releases, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.4.... http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.... http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8....
Security advisory AST-2011-011 is available at:
http://downloads.asterisk.org/pub/security/AST-2011-011.pdf The Asterisk Development Team has announced the release of Asterisk versions 1.4.41.1, 1.6.2.18.1, and 1.8.4.3, which are security releases.
These releases are available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk/releases
The release of Asterisk 1.4.41.1, 1.6.2.18, and 1.8.4.3 resolves several issues as outlined below:
* AST-2011-008: If a remote user sends a SIP packet containing a null, Asterisk assumes available data extends past the null to the end of the packet when the buffer is actually truncated when copied. This causes SIP header parsing to modify data past the end of the buffer altering unrelated memory structures. This vulnerability does not affect TCP/TLS connections. -- Resolved in 1.6.2.18.1 and 1.8.4.3
* AST-2011-009: A remote user sending a SIP packet containing a Contact header with a missing left angle bracket (<) causes Asterisk to access a null pointer. -- Resolved in 1.8.4.3
* AST-2011-010: A memory address was inadvertently transmitted over the network via IAX2 via an option control frame and the remote party would try to access it. -- Resolved in 1.4.41.1, 1.6.2.18.1, and 1.8.4.3
The issues and resolutions are described in the AST-2011-008, AST-2011-009, and AST-2011-010 security advisories.
For more information about the details of these vulnerabilities, please read the security advisories AST-2011-008, AST-2011-009, and AST-2011-010, which were released at the same time as this announcement.
For a full list of changes in the current releases, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.4.... http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.... http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8....
Security advisories AST-2011-008, AST-2011-009, and AST-2011-010 are available at:
http://downloads.asterisk.org/pub/security/AST-2011-008.pdf http://downloads.asterisk.org/pub/security/AST-2011-009.pdf http://downloads.asterisk.org/pub/security/AST-2011-010.pdf
The Asterisk Development Team has announced the release of Asterisk version 1.8.4.2, which is a security release for Asterisk 1.8.
This release is available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk/releases
The release of Asterisk 1.8.4.2 resolves an issue with SIP URI parsing which can lead to a remotely exploitable crash:
Remote Crash Vulnerability in SIP channel driver (AST-2011-007)
The issue and resolution is described in the AST-2011-007 security advisory.
For more information about the details of this vulnerability, please read the security advisory AST-2011-007, which was released at the same time as this announcement.
For a full list of changes in the current release, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8....
Security advisory AST-2011-007 is available at:
http://downloads.asterisk.org/pub/security/AST-2011-007.pdf
The Asterisk Development Team has announced the release of Asterisk 1.8.4.1. This release is available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk/
The release of Asterisk 1.8.4.1 resolves several issues reported by the community. Without your help this release would not have been possible. Thank you!
Below is a list of issues resolved in this release:
* Fix our compliance with RFC 3261 section 18.2.2. (aka Cisco phone fix) (Closes issue #18951. Reported by jmls. Patched by wdoekes)
* Resolve a change in IPv6 header parsing due to the Cisco phone fix issue. This issue was found and reported by the Asterisk test suite. (Closes issue #18951. Patched by mnicholson)
* Resolve potential crash when using SIP TLS support. (Closes issue #19192. Reported by stknob. Patched by Chainsaw. Tested by vois, Chainsaw)
* Improve reliability when using SIP TLS. (Closes issue #19182. Reported by st. Patched by mnicholson)
For a full list of changes in this release candidate, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.4.1
The Asterisk Development Team has announced the release of Asterisk 1.8.4. This release is available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk/
The release of Asterisk 1.8.4 resolves several issues reported by the community. Without your help this release would not have been possible. Thank you!
Below is a sample of the issues resolved in this release:
* Use SSLv23_client_method instead of old SSLv2 only. (Closes issue #19095, #19138. Reported, patched by tzafrir. Tested by russell and chazzam.
* Resolve crash in ast_mutex_init() (Patched by twilson)
* Resolution of several DTMF based attended transfer issues. (Closes issue #17999, #17096, #18395, #17273. Reported by iskatel, gelo, shihchuan, grecco. Patched by rmudgett)
NOTE: Be sure to read the ChangeLog for more information about these changes.
* Resolve deadlocks related to device states in chan_sip (Closes issue #18310. Reported, patched by one47. Patched by jpeeler)
* Resolve an issue with the Asterisk manager interface leaking memory when disabled. (Reported internally by kmorgan. Patched by russellb)
* Support greetingsfolder as documented in voicemail.conf.sample. (Closes issue #17870. Reported by edhorton. Patched by seanbright)
* Fix channel redirect out of MeetMe() and other issues with channel softhangup (Closes issue #18585. Reported by oej. Tested by oej, wedhorn, russellb. Patched by russellb)
* Fix voicemail sequencing for file based storage. (Closes issue #18498, #18486. Reported by JJCinAZ, bluefox. Patched by jpeeler)
* Set hangup cause in local_hangup so the proper return code of 486 instead of 503 when using Local channels when the far sides returns a busy. Also affects CCSS in Asterisk 1.8+. (Patched by twilson)
* Fix issues with verbose messages not being output to the console. (Closes issue #18580. Reported by pabelanger. Patched by qwell)
* Fix Deadlock with attended transfer of SIP call (Closes issue #18837. Reported, patched by alecdavis. Tested by alecdavid, Irontec, ZX81, cmaj)
Includes changes per AST-2011-005 and AST-2011-006 For a full list of changes in this release candidate, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.4
Information about the security releases are available at:
http://downloads.asterisk.org/pub/security/AST-2011-005.pdf http://downloads.asterisk.org/pub/security/AST-2011-006.pdf
-------------------------------------------------------------------------------- ChangeLog:
* Wed Jun 29 2011 Jeffrey C. Ollie jeff@ocjtech.us - 1.8.4.4-1 - The Asterisk Development Team has announced the release of Asterisk - versions 1.4.41.2, 1.6.2.18.2, and 1.8.4.4, which are security - releases. - - These releases are available for immediate download at - http://downloads.asterisk.org/pub/telephony/asterisk/releases - - The release of Asterisk 1.4.41.2, 1.6.2.18.2, and 1.8.4.4 resolves the - following issue: - - AST-2011-011: Asterisk may respond differently to SIP requests from an - invalid SIP user than it does to a user configured on the system, even - when the alwaysauthreject option is set in the configuration. This can - leak information about what SIP users are valid on the Asterisk - system. - - For more information about the details of this vulnerability, please - read the security advisory AST-2011-011, which was released at the - same time as this announcement. - - For a full list of changes in the current releases, please see the ChangeLog: - - http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.4.... - http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.... - http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.... - - Security advisory AST-2011-011 is available at: - - http://downloads.asterisk.org/pub/security/AST-2011-011.pdf * Mon Jun 27 2011 Jeffrey C. Ollie jeff@ocjtech.us - 1.8.4.3-3 - Don't forget stereorize * Mon Jun 27 2011 Jeffrey C. Ollie jeff@ocjtech.us - 1.8.4.3-2 - Move /var/run/asterisk to /run/asterisk - Add comments to systemd service file on how to mimic safe_asterisk functionality - Build more of the optional binaries - Install the tmpfiles.d configuration on Fedora 15 * Fri Jun 24 2011 Jeffrey C. Ollie jeff@ocjtech.us - 1.8.4.3-1 - The Asterisk Development Team has announced the release of Asterisk versions - 1.4.41.1, 1.6.2.18.1, and 1.8.4.3, which are security releases. - - These releases are available for immediate download at - http://downloads.asterisk.org/pub/telephony/asterisk/releases - - The release of Asterisk 1.4.41.1, 1.6.2.18, and 1.8.4.3 resolves several issues - as outlined below: - - * AST-2011-008: If a remote user sends a SIP packet containing a null, - Asterisk assumes available data extends past the null to the - end of the packet when the buffer is actually truncated when - copied. This causes SIP header parsing to modify data past - the end of the buffer altering unrelated memory structures. - This vulnerability does not affect TCP/TLS connections. - -- Resolved in 1.6.2.18.1 and 1.8.4.3 - - * AST-2011-009: A remote user sending a SIP packet containing a Contact header - with a missing left angle bracket (<) causes Asterisk to - access a null pointer. - -- Resolved in 1.8.4.3 - - * AST-2011-010: A memory address was inadvertently transmitted over the - network via IAX2 via an option control frame and the remote party would try - to access it. - -- Resolved in 1.4.41.1, 1.6.2.18.1, and 1.8.4.3 - - The issues and resolutions are described in the AST-2011-008, AST-2011-009, and - AST-2011-010 security advisories. - - For more information about the details of these vulnerabilities, please read - the security advisories AST-2011-008, AST-2011-009, and AST-2011-010, which were - released at the same time as this announcement. - - For a full list of changes in the current releases, please see the ChangeLog: - - http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.4.... - http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.... - http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.... - - Security advisories AST-2011-008, AST-2011-009, and AST-2011-010 are available - at: - - http://downloads.asterisk.org/pub/security/AST-2011-008.pdf - http://downloads.asterisk.org/pub/security/AST-2011-009.pdf - http://downloads.asterisk.org/pub/security/AST-2011-010.pdf * Tue Jun 21 2011 Jeffrey C. Ollie jeff@ocjtech.us - 1.8.4.2-2 - Convert to systemd * Fri Jun 17 2011 Marcela Mašláňová mmaslano@redhat.com - 1.8.4.2-1.2 - Perl mass rebuild * Fri Jun 10 2011 Marcela Mašláňová mmaslano@redhat.com - 1.8.4.2-1.1 - Perl 5.14 mass rebuild * Fri Jun 3 2011 Jeffrey C. Ollie jeff@ocjtech.us - 1.8.4.2-1: - - The Asterisk Development Team has announced the release of Asterisk - version 1.8.4.2, which is a security release for Asterisk 1.8. - - This release is available for immediate download at - http://downloads.asterisk.org/pub/telephony/asterisk/releases - - The release of Asterisk 1.8.4.2 resolves an issue with SIP URI - parsing which can lead to a remotely exploitable crash: - - Remote Crash Vulnerability in SIP channel driver (AST-2011-007) - - The issue and resolution is described in the AST-2011-007 security - advisory. - - For more information about the details of this vulnerability, please - read the security advisory AST-2011-007, which was released at the - same time as this announcement. - - For a full list of changes in the current release, please see the ChangeLog: - - http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.... - - Security advisory AST-2011-007 is available at: - - http://downloads.asterisk.org/pub/security/AST-2011-007.pdf - - The Asterisk Development Team has announced the release of Asterisk 1.8.4.1. - This release is available for immediate download at - http://downloads.asterisk.org/pub/telephony/asterisk/ - - The release of Asterisk 1.8.4.1 resolves several issues reported by the - community. Without your help this release would not have been possible. - Thank you! - - Below is a list of issues resolved in this release: - - * Fix our compliance with RFC 3261 section 18.2.2. (aka Cisco phone fix) - (Closes issue #18951. Reported by jmls. Patched by wdoekes) - - * Resolve a change in IPv6 header parsing due to the Cisco phone fix issue. - This issue was found and reported by the Asterisk test suite. - (Closes issue #18951. Patched by mnicholson) - - * Resolve potential crash when using SIP TLS support. - (Closes issue #19192. Reported by stknob. Patched by Chainsaw. Tested by - vois, Chainsaw) - - * Improve reliability when using SIP TLS. - (Closes issue #19182. Reported by st. Patched by mnicholson) - - - For a full list of changes in this release candidate, please see the ChangeLog: - - http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.4.1
- The Asterisk Development Team has announced the release of Asterisk 1.8.4. This - release is available for immediate download at - http://downloads.asterisk.org/pub/telephony/asterisk/ - - The release of Asterisk 1.8.4 resolves several issues reported by the community. - Without your help this release would not have been possible. Thank you! - - Below is a sample of the issues resolved in this release: - - * Use SSLv23_client_method instead of old SSLv2 only. - (Closes issue #19095, #19138. Reported, patched by tzafrir. Tested by russell - and chazzam. - - * Resolve crash in ast_mutex_init() - (Patched by twilson) - - * Resolution of several DTMF based attended transfer issues. - (Closes issue #17999, #17096, #18395, #17273. Reported by iskatel, gelo, - shihchuan, grecco. Patched by rmudgett) - - NOTE: Be sure to read the ChangeLog for more information about these changes. - - * Resolve deadlocks related to device states in chan_sip - (Closes issue #18310. Reported, patched by one47. Patched by jpeeler) - - * Resolve an issue with the Asterisk manager interface leaking memory when - disabled. - (Reported internally by kmorgan. Patched by russellb) - - * Support greetingsfolder as documented in voicemail.conf.sample. - (Closes issue #17870. Reported by edhorton. Patched by seanbright) - - * Fix channel redirect out of MeetMe() and other issues with channel softhangup - (Closes issue #18585. Reported by oej. Tested by oej, wedhorn, russellb. - Patched by russellb) - - * Fix voicemail sequencing for file based storage. - (Closes issue #18498, #18486. Reported by JJCinAZ, bluefox. Patched by - jpeeler) - - * Set hangup cause in local_hangup so the proper return code of 486 instead of - 503 when using Local channels when the far sides returns a busy. Also affects - CCSS in Asterisk 1.8+. - (Patched by twilson) - - * Fix issues with verbose messages not being output to the console. - (Closes issue #18580. Reported by pabelanger. Patched by qwell) - - * Fix Deadlock with attended transfer of SIP call - (Closes issue #18837. Reported, patched by alecdavis. Tested by - alecdavid, Irontec, ZX81, cmaj) - - Includes changes per AST-2011-005 and AST-2011-006 - For a full list of changes in this release candidate, please see the ChangeLog: - - http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.4 - - Information about the security releases are available at: - - http://downloads.asterisk.org/pub/security/AST-2011-005.pdf - http://downloads.asterisk.org/pub/security/AST-2011-006.pdf -------------------------------------------------------------------------------- References:
[ 1 ] Bug #710441 - CVE-2011-2216 Asterisk: Remote DoS (crash) in SIP channel driver (AST-2011-007) https://bugzilla.redhat.com/show_bug.cgi?id=710441 --------------------------------------------------------------------------------
================================================================================ drupal6-6.22-3.el6 (FEDORA-EPEL-2011-3674) An open-source content-management platform -------------------------------------------------------------------------------- Update Information:
Removes spurious dirs in /etc/drupal6 to avoid confusion. -------------------------------------------------------------------------------- ChangeLog:
* Thu Jun 30 2011 Jon Ciesla limb@jcomserv.net - 6.22-3 - Drop unneeded dirs in /etc/drupal6, BZ 706735. * Fri Jun 17 2011 Jon Ciesla limb@jcomserv.net - 6.22-2 - Bump and rebuild for BZ 712251. -------------------------------------------------------------------------------- References:
[ 1 ] Bug #706735 - Put modules and themes directories under /etc/drupal6/all/ https://bugzilla.redhat.com/show_bug.cgi?id=706735 --------------------------------------------------------------------------------
================================================================================ drupal6-feeds-1.0-0.6.beta11.el6 (FEDORA-EPEL-2011-3684) An import and aggregation framework for Drupal -------------------------------------------------------------------------------- Update Information:
New upstream version. -------------------------------------------------------------------------------- ChangeLog:
* Thu Jun 30 2011 Peter Borsa peter.borsa@gmail.com - 1.0-0.6.beta11 - Fixed release number in the spec file. * Thu Jun 30 2011 Peter Borsa peter.borsa@gmail.com - 1.0-0.1.beta11 - New upstream version. -------------------------------------------------------------------------------- References:
[ 1 ] Bug #717587 - drupal6-feeds-1.0-beta11 is available https://bugzilla.redhat.com/show_bug.cgi?id=717587 --------------------------------------------------------------------------------
================================================================================ drupal7-7.4-1.el6 (FEDORA-EPEL-2011-3672) An open-source content-management platform -------------------------------------------------------------------------------- Update Information:
Remember to log in as user 1 prior to the RPM update, to perform the DB upgrade via http://yoursite/update.php.
* Advisory ID: DRUPAL-SA-CORE-2011-002 * Project: Drupal core [1] * Version: 7.x * Date: 2011-JUNE-29 * Security risk: Highly critical [2] * Exploitable from: Remote * Vulnerability: Access bypass
-------- DESCRIPTION ---------------------------------------------------------
.... Access bypass in node listings
Listings showing nodes but not JOINing the node table show all nodes regardless of restrictions imposed by the node_access system. In core, this affects the taxonomy and the forum subsystem.
Note that fixing this issue in contributed modules requires a backwards-compatible API change for modules listing nodes. See http://drupal.org/node/1204572 [3] for more details.
This issue affects Drupal 7.x only.
-------- VERSIONS AFFECTED ---------------------------------------------------
* Drupal 7.0, 7.1 and 7.2.
-------- SOLUTION ------------------------------------------------------------
Install the latest version:
* If you are running Drupal 7.x then upgrade to Drupal 7.3 or 7.4.
The Security Team has released both a pure security update without other bug fixes and a security update combined with other bug fixes and improvements. You can choose to either only include the security update for an immediate fix (which might require less quality assurance and testing) or more fixes and improvements alongside the security fixes by choosing between Drupal 7.3 and Drupal 7.4. Read the announcement [4] for more information.
See also the Drupal core [5] project page.
-------- REPORTED BY ---------------------------------------------------------
* The access bypass was reported independently by numerous people, including Sascha Grossenbacher [6], Khaled Alhourani [7], and Ben Ford [8].
-------- FIXED BY ------------------------------------------------------------
* The access bypass was fixed by Károly Négyesi [9], member of the Drupal security team
-------- CONTACT AND MORE INFORMATION ----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the contact form at http://drupal.org/contact [10].
Learn more about the Drupal Security team and their policies [11], writing secure code for Drupal [12], and securing your site [13].
[1] http://drupal.org/project/drupal [2] http://drupal.org/security-team/risk-levels [3] http://drupal.org/node/1204572 [4] http://drupal.org/drupal-7.4 [5] http://drupal.org/project/drupal [6] http://drupal.org/user/214652 [7] http://drupal.org/user/265439 [8] http://drupal.org/user/12534 [9] http://drupal.org/user/9446 [10] http://drupal.org/contact [11] http://drupal.org/security-team [12] http://drupal.org/writing-secure-code [13] http://drupal.org/security/secure-configuration
-------------------------------------------------------------------------------- ChangeLog:
* Thu Jun 30 2011 Jon Ciesla limb@jcomserv.net - 7.4-1 - New upstream, SA-CORE-2011-002, BZ 717874. - Dropped unused dirs in /etc/drupal7/, BZ 703736. * Fri Jun 17 2011 Jon Ciesla limb@jcomserv.net - 7.2-2 - Bump and rebuild for BZ 712251. -------------------------------------------------------------------------------- References:
[ 1 ] Bug #717874 - Remote access bypass vulnerability in Drupal 7 https://bugzilla.redhat.com/show_bug.cgi?id=717874 [ 2 ] Bug #706736 - Put modules and themes directories under /etc/drupal7/all/ https://bugzilla.redhat.com/show_bug.cgi?id=706736 --------------------------------------------------------------------------------
================================================================================ naev-0.5.0-3.el6 (FEDORA-EPEL-2011-3673) 2d action, RPG space game -------------------------------------------------------------------------------- Update Information:
First release in Fedora package collection. --------------------------------------------------------------------------------
================================================================================ naev-data-0.5.0-4.el6 (FEDORA-EPEL-2011-3673) Data files for NAEV -------------------------------------------------------------------------------- Update Information:
First release in Fedora package collection. --------------------------------------------------------------------------------
================================================================================ python-taboot-0.3.0-1.el6 (FEDORA-EPEL-2011-3677) Client utility for scripted multi-system administration over Func -------------------------------------------------------------------------------- Update Information:
Fixed #13 - Generate HTML versions of the man pages
Fixed #6, #7, #11, #12 - Updated the Nagios task completely to use the native Func Nagios module
Fixed #17 - sleep.Minutes not printing correct status message
Fixed #20 - Be more helpful when YAML fails to load
Fixed #22 - Taboots not processing YAML files with multiple documents inside
Fixed #15 - Die gracefully when processing bad CLI options -------------------------------------------------------------------------------- ChangeLog:
* Thu Jun 23 2011 Tim Bielawa tbielawa@redhat.com 0.3.0-1 - Update version. 0.3.0. If Linux can do it -- so can we. (tbielawa@redhat.com) - Now included in EPEL and Fedora. Fixes #9 (tbielawa@redhat.com) - Correct a lot of spelling errors. Fixes #23 (Taboot maintainer has atrocious spelling) (tbielawa@redhat.com) - Correctly handle YAML files with multiple YAML documents inside. Fixes #22 (tbielawa@redhat.com) - Better YAML loading debugging. Fixes #20 (tbielawa@redhat.com) - Handle bad CLI options gracefully. Fixes #15 (tbielawa@redhat.com) - Modify patch from jdetiber. Fixes #17 - sleep.Minutes not printing correct status message (tbielawa@redhat.com) - Updated output for sleep.Minutes (jason.detiberus@redhat.com) - Update man page (tbielawa@redhat.com) - Update taboot-tasks manpage (tbielawa@redhat.com) - Make HOST the default for downtime scheduling again (tbielawa@redhat.com) - Updating Nagios task docs (tbielawa@redhat.com) - Rewrite the Nagios task to use the new Func Nagios module instead of CURL. Fixes #6, #7, #11, #12 (tbielawa@redhat.com) - Adding HTML versions of the man pages to the HTML docs. Fixes #13 (tbielawa@redhat.com) --------------------------------------------------------------------------------
================================================================================ root-5.28.00e-2.el6 (FEDORA-EPEL-2011-3683) Numerical data analysis framework -------------------------------------------------------------------------------- Update Information:
Update of root to version 5.28.00e. For a list of new features and fixed bugs see: http://root.cern.ch/drupal/content/root-version-v5-28-00-patch-release-notes
-------------------------------------------------------------------------------- ChangeLog:
* Wed Jun 29 2011 Mattias Ellert mattias.ellert@fysast.uu.se - 5.28.00e-2 - Change build requires from qt-devel to qt4-devel * Wed Jun 29 2011 Mattias Ellert mattias.ellert@fysast.uu.se - 5.28.00e-1 - Update to 5.28.00e * Mon Jun 20 2011 ajax@redhat.com - 5.28.00d-2 - Rebuild for new glew soname --------------------------------------------------------------------------------
================================================================================ rubygem-gem2rpm-0.7.1-1.el6 (FEDORA-EPEL-2011-3681) Generate rpm specfiles from gems -------------------------------------------------------------------------------- Update Information:
Updated to the 0.7.1 version. -------------------------------------------------------------------------------- ChangeLog:
* Thu Jun 30 2011 Vít Ondruch vondruch@redhat.com - 0.7.1-1 - Updated to the 0.7.1 version. * Wed Feb 9 2011 Fedora Release Engineering rel-eng@lists.fedoraproject.org - 0.6.0-6 - Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild --------------------------------------------------------------------------------
================================================================================ swatch-3.2.3-2.el6 (FEDORA-EPEL-2011-3687) Tool for actively monitoring log files -------------------------------------------------------------------------------- Update Information:
The Simple WATCHer is an automated monitoring tool that is capable of alerting system administrators of anything that matches the patterns described in the configuration file, whilst constantly searching logfiles using perl.
--------------------------------------------------------------------------------
================================================================================ wordpress-3.1.4-1.el6 (FEDORA-EPEL-2011-3682) Blog tool and publishing platform -------------------------------------------------------------------------------- Update Information:
Upstream security release. Details at http://wordpress.org/news/2011/06/wordpress-3-1-4/ Fix old FSF address and Summary to make rpmlint happy. Make wp-content directory owned by apache:apache. Correctly Provides/Obsoletes (with versions). Upgrade to the latest upstream version (security fixes and enhancements, BZ 707772). Move wp-content directory to /var/www/wordpress/ (BZ 522897). Simplify overly detailed files list. Actually, we just don't need gettext.php at all, it is provided by php itself. Just remove the file, don't make a symlink. Revert back to wp-content in /usr/share/wordpress, I am not able to make it work. Not fixing BZ 522897. -------------------------------------------------------------------------------- ChangeLog:
* Wed Jun 29 2011 Matěj Cepl mcepl@redhat.com - 3.1.4-1 - New upstream security release. * Thu Jun 2 2011 Matěj Cepl mcepl@redhat.com - 3.1.3-3 - Actually, we just don't need gettext.php at all, it is provided by php itself. Just remove the file, don't make a symlink. - revert back to wp-content in /usr/share/wordpress, I am not able to make it work. Not fixing BZ 522897. * Wed Jun 1 2011 Matěj Cepl mcepl@redhat.com - 3.1.3-2 - Fix old FSF address and Summary to make rpmlint happy. - Make wp-content directory owned by apache:apache - Correctly Provides/Obsoletes (with versions) * Wed May 25 2011 Matěj Cepl mcepl@redhat.com - 3.1.3-1 - Upgrade to the latest upstream version (security fixes and enhancements, BZ 707772) - Move wp-content directory to /var/www/wordpress/ (BZ 522897) - Simplify overly detailed %files -------------------------------------------------------------------------------- References:
[ 1 ] Bug #707772 - New upstream version 3.1.3 has been released https://bugzilla.redhat.com/show_bug.cgi?id=707772 [ 2 ] Bug #522897 - Unable To Upload Images To /usr/share/wordpress/wp-content/uploads/ https://bugzilla.redhat.com/show_bug.cgi?id=522897 --------------------------------------------------------------------------------
epel-devel@lists.fedoraproject.org