[EPEL-devel] Fedora EPEL 6 updates-testing report

updates at fedoraproject.org updates at fedoraproject.org
Mon Nov 24 21:23:20 UTC 2014


The following Fedora EPEL 6 Security updates need testing:
 Age  URL
 947  https://admin.fedoraproject.org/updates/FEDORA-EPEL-2012-5620/bugzilla-3.4.14-2.el6
 165  https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1616/puppet-2.7.26-1.el6
  36  https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3434/pylint-1.3.1-1.el6,python-astroid-1.2.1-2.el6,python-logilab-common-0.62.1-2.el6
  22  https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3748/tnftp-20141031-1.el6
  14  https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3927/drupal7-ckeditor-1.16-2.el6
  11  https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3962/oath-toolkit-2.0.2-5.el6
  11  https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-4005/nginx-1.0.15-11.el6
  11  https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-4008/cross-binutils-2.23.51.0.3-1.el6.1
  11  https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3975/polarssl-1.3.2-3.el6
  10  https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-4057/moodle-2.5.9-1.el6
   5  https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-4151/lsyncd-2.1.4-4.el6.1.1
   5  https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-4144/nodejs-0.10.33-1.el6,libuv-0.10.29-1.el6
   4  https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-4165/python-eyed3-0.7.4-5.el6
   4  https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-4176/clamav-0.98.5-1.el6
   2  https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-4237/drupal7-7.34-1.el6
   2  https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-4192/wordpress-4.0.1-1.el6
   2  https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-4211/phpMyAdmin-4.0.10.6-1.el6
   2  https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-4233/drupal6-6.34-1.el6
   0  https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-4242/facter-1.6.18-8.el6
   0  https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-4243/asterisk-1.8.32.1-1.el6
   0  https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-2069/php-channel-phpseclib-1.3-1.el6,php-sabredav-Sabre_VObject-2.1.4-2.el6,php-sabredav-Sabre_HTTP-1.7.11-1.el6,php-sabredav-Sabre_DAVACL-1.7.9-1.el6,php-sabredav-Sabre_DAV-1.7.13-1.el6,php-sabredav-Sabre_CardDAV-1.7.9-2.el6,php-sabredav-Sabre_CalDAV-1.7.9-1.el6,php-irodsphp-3.3.0-0.4.beta1.el6,php-phpseclib-net-ssh2-0.3.9-1.el6,php-phpseclib-net-sftp-0.3.9-1.el6,php-phpseclib-crypt-twofish-0.3.9-2.el6,php-phpseclib-crypt-tripledes-0.3.9-2.el6,php-phpseclib-crypt-rsa-0.3.9-1.el6,php-phpseclib-crypt-rijndael-0.3.9-2.el6,php-phpseclib-crypt-rc4-0.3.9-2.el6,php-phpseclib-crypt-random-0.3.9-1.el6,php-phpseclib-crypt-hash-0.3.9-1.el6,php-phpseclib-crypt-des-0.3.9-2.el6,php-phpseclib-crypt-blowfish-0.3.9-2.el6,php-phpseclib-crypt-aes-0.3.9-1.el6,php-phpseclib-math-biginteger-0.3.9-1.el6,php-phpseclib-crypt-base-0.3.9-1.el6,owncloud-6.0.6-1.el6


The following builds have been pushed to Fedora EPEL 6 updates-testing

    asterisk-1.8.32.1-1.el6
    backupninja-1.0.1-5.el6
    facter-1.6.18-8.el6
    fedora-packager-0.5.10.5-1.el6
    golang-googlecode-go-exp-0-0.3.hgbd8df7009305.el6
    golang-googlecode-net-0-0.17.hg90e232e2462d.el6
    golang-googlecode-text-0-0.2.hg024681b033be.el6
    owncloud-6.0.6-1.el6
    php-channel-phpseclib-1.3-1.el6
    php-horde-Horde-Core-2.17.0-1.el6
    php-horde-Horde-Imap-Client-2.25.4-1.el6
    php-horde-Horde-ListHeaders-1.2.0-1.el6
    php-horde-Horde-Mail-2.5.0-1.el6
    php-horde-Horde-Mime-2.5.1-1.el6
    php-horde-Horde-Smtp-1.7.0-1.el6
    php-horde-nag-4.2.3-1.el6
    php-irodsphp-3.3.0-0.4.beta1.el6
    php-opencloud-1.11.0-3.el6
    php-phpseclib-crypt-aes-0.3.9-1.el6
    php-phpseclib-crypt-base-0.3.9-1.el6
    php-phpseclib-crypt-blowfish-0.3.9-2.el6
    php-phpseclib-crypt-des-0.3.9-2.el6
    php-phpseclib-crypt-hash-0.3.9-1.el6
    php-phpseclib-crypt-random-0.3.9-1.el6
    php-phpseclib-crypt-rc4-0.3.9-2.el6
    php-phpseclib-crypt-rijndael-0.3.9-2.el6
    php-phpseclib-crypt-rsa-0.3.9-1.el6
    php-phpseclib-crypt-tripledes-0.3.9-2.el6
    php-phpseclib-crypt-twofish-0.3.9-2.el6
    php-phpseclib-math-biginteger-0.3.9-1.el6
    php-phpseclib-net-sftp-0.3.9-1.el6
    php-phpseclib-net-ssh2-0.3.9-1.el6
    php-sabredav-Sabre_CalDAV-1.7.9-1.el6
    php-sabredav-Sabre_CardDAV-1.7.9-2.el6
    php-sabredav-Sabre_DAV-1.7.13-1.el6
    php-sabredav-Sabre_DAVACL-1.7.9-1.el6
    php-sabredav-Sabre_HTTP-1.7.11-1.el6
    php-sabredav-Sabre_VObject-2.1.4-2.el6
    python-flask-rstpages-0.3-3.el6
    will-crash-0.9-2.el6
    ykpers-1.16.1-1.el6

Details about builds:


================================================================================
 asterisk-1.8.32.1-1.el6 (FEDORA-EPEL-2014-4243)
 The Open Source PBX
--------------------------------------------------------------------------------
Update Information:

* Fri Nov 21 2014 Jeffrey C. Ollie <jeff at ocjtech.us> - 1.8.32.1-1:
- The Asterisk Development Team has announced security releases for Certified
- Asterisk 1.8.28 and 11.6 and Asterisk 1.8, 11, 12, and 13. The available
- security releases are released as versions 1.8.28-cert3, 11.6-cert8, 1.8.32.1,
- 11.14.1, 12.7.1, and 13.0.1.
-
- These releases are available for immediate download at
- http://downloads.asterisk.org/pub/telephony/asterisk/releases
-
- The release of these versions resolves the following security vulnerabilities:
-
- * AST-2014-012: Unauthorized access in the presence of ACLs with mixed IP
-   address families
-
-   Many modules in Asterisk that service incoming IP traffic have ACL options
-   ("permit" and "deny") that can be used to whitelist or blacklist address
-   ranges. A bug has been discovered where the address family of incoming
-   packets is only compared to the IP address family of the first entry in the
-   list of access control rules. If the source IP address for an incoming
-   packet is not of the same address as the first ACL entry, that packet
-   bypasses all ACL rules.
-
- * AST-2014-018: Permission Escalation through DB dialplan function
-
-   The DB dialplan function when executed from an external protocol, such as AMI,
-   could result in a privilege escalation. Users with a lower class authorization
-   in AMI can access the internal Asterisk database without the required SYSTEM
-   class authorization.
-
- In addition, the release of 11.6-cert8 and 11.14.1 resolves the following
- security vulnerability:
-
- * AST-2014-014: High call load with ConfBridge can result in resource exhaustion
-
-   The ConfBridge application uses an internal bridging API to implement
-   conference bridges. This internal API uses a state model for channels within
-   the conference bridge and transitions between states as different things
-   occur. Unload load it is possible for some state transitions to be delayed
-   causing the channel to transition from being hung up to waiting for media. As
-   the channel has been hung up remotely no further media will arrive and the
-   channel will stay within ConfBridge indefinitely.
-
- In addition, the release of 11.6-cert8, 11.14.1, 12.7.1, and 13.0.1 resolves
- the following security vulnerability:
-
- * AST-2014-017: Permission Escalation via ConfBridge dialplan function and
-                 AMI ConfbridgeStartRecord Action
-
-   The CONFBRIDGE dialplan function when executed from an external protocol (such
-   as AMI) can result in a privilege escalation as certain options within that
-   function can affect the underlying system. Additionally, the AMI
-   ConfbridgeStartRecord action has options that would allow modification of the
-   underlying system, and does not require SYSTEM class authorization in AMI.
-
- Finally, the release of 12.7.1 and 13.0.1 resolves the following security
- vulnerabilities:
-
- * AST-2014-013: Unauthorized access in the presence of ACLs in the PJSIP stack
-
-   The Asterisk module res_pjsip provides the ability to configure ACLs that may
-   be used to reject SIP requests from various hosts. However, the module
-   currently fails to create and apply the ACLs defined in its configuration
-   file on initial module load.
-
- * AST-2014-015: Remote crash vulnerability in PJSIP channel driver
-
-   The chan_pjsip channel driver uses a queue approach for relating to SIP
-   sessions. There exists a race condition where actions may be queued to answer
-   a session or send ringing after a SIP session has been terminated using a
-   CANCEL request. The code will incorrectly assume that the SIP session is still
-   active and attempt to send the SIP response. The PJSIP library does not
-   expect the SIP session to be in the disconnected state when sending the
-   response and asserts.
-
- * AST-2014-016: Remote crash vulnerability in PJSIP channel driver
-
-   When handling an INVITE with Replaces message the res_pjsip_refer module
-   incorrectly assumes that it will be operating on a channel that has just been
-   created. If the INVITE with Replaces message is sent in-dialog after a session
-   has been established this assumption will be incorrect. The res_pjsip_refer
-   module will then hang up a channel that is actually owned by another thread.
-   When this other thread attempts to use the just hung up channel it will end up
-   using a freed channel which will likely result in a crash.
-
- For more information about the details of these vulnerabilities, please read
- security advisories AST-2014-012, AST-2014-013, AST-2014-014, AST-2014-015,
- AST-2014-016, AST-2014-017, and AST-2014-018, which were released at the same
- time as this announcement.
-
- For a full list of changes in the current releases, please see the ChangeLogs:
-
- http://downloads.asterisk.org/pub/telephony/certified-asterisk/releases/ChangeLog-1.8.28-cert3
- http://downloads.asterisk.org/pub/telephony/certified-asterisk/releases/ChangeLog-11.6-cert8
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.32.1
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.14.1
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-12.7.1
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-13.0.1
-
- The security advisories are available at:
-
-  * http://downloads.asterisk.org/pub/security/AST-2014-012.pdf
-  * http://downloads.asterisk.org/pub/security/AST-2014-013.pdf
-  * http://downloads.asterisk.org/pub/security/AST-2014-014.pdf
-  * http://downloads.asterisk.org/pub/security/AST-2014-015.pdf
-  * http://downloads.asterisk.org/pub/security/AST-2014-016.pdf
-  * http://downloads.asterisk.org/pub/security/AST-2014-017.pdf
-  * http://downloads.asterisk.org/pub/security/AST-2014-018.pdf
* Fri Nov 21 2014 Jeffrey C. Ollie <jeff at ocjtech.us> - 1.8.32.0-1:
- The Asterisk Development Team has announced the release of Asterisk 1.8.32.0.
- This release is available for immediate download at
- http://downloads.asterisk.org/pub/telephony/asterisk
-
- The release of Asterisk 1.8.32.0 resolves several issues reported by the
- community and would have not been possible without your participation.
- Thank you!
-
- The following are the issues resolved in this release:
-
- Bugs fixed in this release:
- -----------------------------------
-  * ASTERISK-24348 - Built-in editline tab complete segfault with
-       MALLOC_DEBUG (Reported by Walter Doekes)
-  * ASTERISK-24335 - [PATCH] Asterisk incorrectly responds 503 to
-       INVITE retransmissions of rejected calls (Reported by Torrey
-       Searle)
-  * ASTERISK-23768 - [patch] Asterisk man page contains a (new)
-       unquoted minus sign (Reported by Jeremy Lainé)
-  * ASTERISK-24357 - [fax] Out of bounds error in update_modem_bits
-       (Reported by Jeremy Lainé)
-  * ASTERISK-22945 - [patch] Memory leaks in chan_sip.c with
-       realtime peers (Reported by ibercom)
-  * ASTERISK-24390 - astobj2: REF_DEBUG reports false leaks with
-       ao2_callback with OBJ_MULTIPLE (Reported by Corey Farrell)
-  * ASTERISK-24011 - [patch]safe_asterisk tries to set ulimit -n too
-       high on linux systems with lots of RAM (Reported by Michael
-       Myles)
-  * ASTERISK-20784 - Failure to receive an ACK to a SIP Re-INVITE
-       results in a SIP channel leak (Reported by NITESH BANSAL)
-  * ASTERISK-15879 - [patch] Failure to receive an ACK to a SIP
-       Re-INVITE results in a SIP channel leak (Reported by Torrey
-       Searle)
-  * ASTERISK-24406 - Some caller ID strings are parsed differently
-       since 11.13.0 (Reported by Etienne Lessard)
-  * ASTERISK-24325 - res_calendar_ews: cannot be used with neon 0.30
-       (Reported by Tzafrir Cohen)
-  * ASTERISK-13797 - [patch] relax badshell tilde test (Reported by
-       Tzafrir Cohen)
-  * ASTERISK-22791 - asterisk sends Re-INVITE after receiving a BYE
-       (Reported by Paolo Compagnini)
-  * ASTERISK-18923 - res_fax_spandsp usage counter is wrong
-       (Reported by Grigoriy Puzankin)
-  * ASTERISK-24393 - rtptimeout=0 doesn't disable rtptimeout
-       (Reported by Dmitry Melekhov)
-  * ASTERISK-24063 - [patch]Asterisk does not respect outbound proxy
-       when sending qualify requests (Reported by Damian Ivereigh)
-  * ASTERISK-24425 - [patch] jabber/xmpp to use TLS instead of
-       SSLv3, security fix POODLE (CVE-2014-3566) (Reported by
-       abelbeck)
-  * ASTERISK-24436 - Missing header in res/res_srtp.c when compiling
-       against libsrtp-1.5.0 (Reported by Patrick Laimbock)
-  * ASTERISK-21721 - SIP Failed to parse multiple Supported: headers
-       (Reported by Olle Johansson)
-  * ASTERISK-24190 - IMAP voicemail causes segfault (Reported by
-       Nick Adams)
-  * ASTERISK-24432 - Install refcounter.py when REF_DEBUG is enabled
-       (Reported by Corey Farrell)
-  * ASTERISK-24476 - main/app.c / app_voicemail: ast_writestream
-       leaks (Reported by Corey Farrell)
-  * ASTERISK-24307 - Unintentional memory retention in stringfields
-       (Reported by Etienne Lessard)
-
- For a full list of changes in this release, please see the ChangeLog:
-
- http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.32.0

* Tue Oct 21 2014 Jeffrey C. Ollie <jeff at ocjtech.us> - 1.8.31.1-1:
- The Asterisk Development Team has announced security releases for Certified
- Asterisk 1.8.28 and 11.6 and Asterisk 1.8, 11, 12, and 13. The available
- security releases are released as versions 1.8.28-cert2, 11.6-cert7, 1.8.31.1,
- 11.13.1, 12.6.1, and 13.0.0-beta3.
-
- These releases are available for immediate download at
- http://downloads.asterisk.org/pub/telephony/asterisk/releases
-
- The release of these versions resolves the following security vulnerability:
-
- * AST-2014-011: Asterisk Susceptibility to POODLE Vulnerability
-
-   Asterisk is susceptible to the POODLE vulnerability in two ways:
-   1) The res_jabber and res_xmpp module both use SSLv3 exclusively for their
-      encrypted connections.
-   2) The core TLS handling in Asterisk, which is used by the chan_sip channel
-      driver, Asterisk Manager Interface (AMI), and Asterisk HTTP Server, by
-      default allow a TLS connection to fallback to SSLv3. This allows for a
-      MITM to potentially force a connection to fallback to SSLv3, exposing it
-      to the POODLE vulnerability.
-
-   These issues have been resolved in the versions released in conjunction with
-   this security advisory.
-
- For more information about the details of this vulnerability, please read
- security advisory AST-2014-011, which was released at the same time as this
- announcement.
-
- For a full list of changes in the current releases, please see the ChangeLogs:
-
- http://downloads.asterisk.org/pub/telephony/certified-asterisk/releases/ChangeLog-1.8.28-cert2
- http://downloads.asterisk.org/pub/telephony/certified-asterisk/releases/ChangeLog-11.6-cert7
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.31.1
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.13.1
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-12.6.1
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-13.0.0-beta3
-
- The security advisory is available at:
-
-  * http://downloads.asterisk.org/pub/security/AST-2014-011.pdf

--------------------------------------------------------------------------------
ChangeLog:

* Fri Nov 21 2014 Jeffrey C. Ollie <jeff at ocjtech.us> - 1.8.32.1-1:
- The Asterisk Development Team has announced security releases for Certified
- Asterisk 1.8.28 and 11.6 and Asterisk 1.8, 11, 12, and 13. The available
- security releases are released as versions 1.8.28-cert3, 11.6-cert8, 1.8.32.1,
- 11.14.1, 12.7.1, and 13.0.1.
-
- These releases are available for immediate download at
- http://downloads.asterisk.org/pub/telephony/asterisk/releases
-
- The release of these versions resolves the following security vulnerabilities:
-
- * AST-2014-012: Unauthorized access in the presence of ACLs with mixed IP
-   address families
-
-   Many modules in Asterisk that service incoming IP traffic have ACL options
-   ("permit" and "deny") that can be used to whitelist or blacklist address
-   ranges. A bug has been discovered where the address family of incoming
-   packets is only compared to the IP address family of the first entry in the
-   list of access control rules. If the source IP address for an incoming
-   packet is not of the same address as the first ACL entry, that packet
-   bypasses all ACL rules.
-
- * AST-2014-018: Permission Escalation through DB dialplan function
-
-   The DB dialplan function when executed from an external protocol, such as AMI,
-   could result in a privilege escalation. Users with a lower class authorization
-   in AMI can access the internal Asterisk database without the required SYSTEM
-   class authorization.
-
- In addition, the release of 11.6-cert8 and 11.14.1 resolves the following
- security vulnerability:
-
- * AST-2014-014: High call load with ConfBridge can result in resource exhaustion
-
-   The ConfBridge application uses an internal bridging API to implement
-   conference bridges. This internal API uses a state model for channels within
-   the conference bridge and transitions between states as different things
-   occur. Unload load it is possible for some state transitions to be delayed
-   causing the channel to transition from being hung up to waiting for media. As
-   the channel has been hung up remotely no further media will arrive and the
-   channel will stay within ConfBridge indefinitely.
-
- In addition, the release of 11.6-cert8, 11.14.1, 12.7.1, and 13.0.1 resolves
- the following security vulnerability:
-
- * AST-2014-017: Permission Escalation via ConfBridge dialplan function and
-                 AMI ConfbridgeStartRecord Action
-
-   The CONFBRIDGE dialplan function when executed from an external protocol (such
-   as AMI) can result in a privilege escalation as certain options within that
-   function can affect the underlying system. Additionally, the AMI
-   ConfbridgeStartRecord action has options that would allow modification of the
-   underlying system, and does not require SYSTEM class authorization in AMI.
-
- Finally, the release of 12.7.1 and 13.0.1 resolves the following security
- vulnerabilities:
-
- * AST-2014-013: Unauthorized access in the presence of ACLs in the PJSIP stack
-
-   The Asterisk module res_pjsip provides the ability to configure ACLs that may
-   be used to reject SIP requests from various hosts. However, the module
-   currently fails to create and apply the ACLs defined in its configuration
-   file on initial module load.
-
- * AST-2014-015: Remote crash vulnerability in PJSIP channel driver
-
-   The chan_pjsip channel driver uses a queue approach for relating to SIP
-   sessions. There exists a race condition where actions may be queued to answer
-   a session or send ringing after a SIP session has been terminated using a
-   CANCEL request. The code will incorrectly assume that the SIP session is still
-   active and attempt to send the SIP response. The PJSIP library does not
-   expect the SIP session to be in the disconnected state when sending the
-   response and asserts.
-
- * AST-2014-016: Remote crash vulnerability in PJSIP channel driver
-
-   When handling an INVITE with Replaces message the res_pjsip_refer module
-   incorrectly assumes that it will be operating on a channel that has just been
-   created. If the INVITE with Replaces message is sent in-dialog after a session
-   has been established this assumption will be incorrect. The res_pjsip_refer
-   module will then hang up a channel that is actually owned by another thread.
-   When this other thread attempts to use the just hung up channel it will end up
-   using a freed channel which will likely result in a crash.
-
- For more information about the details of these vulnerabilities, please read
- security advisories AST-2014-012, AST-2014-013, AST-2014-014, AST-2014-015,
- AST-2014-016, AST-2014-017, and AST-2014-018, which were released at the same
- time as this announcement.
-
- For a full list of changes in the current releases, please see the ChangeLogs:
-
- http://downloads.asterisk.org/pub/telephony/certified-asterisk/releases/ChangeLog-1.8.28-cert3
- http://downloads.asterisk.org/pub/telephony/certified-asterisk/releases/ChangeLog-11.6-cert8
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.32.1
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.14.1
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-12.7.1
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-13.0.1
-
- The security advisories are available at:
-
-  * http://downloads.asterisk.org/pub/security/AST-2014-012.pdf
-  * http://downloads.asterisk.org/pub/security/AST-2014-013.pdf
-  * http://downloads.asterisk.org/pub/security/AST-2014-014.pdf
-  * http://downloads.asterisk.org/pub/security/AST-2014-015.pdf
-  * http://downloads.asterisk.org/pub/security/AST-2014-016.pdf
-  * http://downloads.asterisk.org/pub/security/AST-2014-017.pdf
-  * http://downloads.asterisk.org/pub/security/AST-2014-018.pdf
* Fri Nov 21 2014 Jeffrey C. Ollie <jeff at ocjtech.us> - 1.8.32.0-1:
- The Asterisk Development Team has announced the release of Asterisk 1.8.32.0.
- This release is available for immediate download at
- http://downloads.asterisk.org/pub/telephony/asterisk
-
- The release of Asterisk 1.8.32.0 resolves several issues reported by the
- community and would have not been possible without your participation.
- Thank you!
-
- The following are the issues resolved in this release:
-
- Bugs fixed in this release:
- -----------------------------------
-  * ASTERISK-24348 - Built-in editline tab complete segfault with
-       MALLOC_DEBUG (Reported by Walter Doekes)
-  * ASTERISK-24335 - [PATCH] Asterisk incorrectly responds 503 to
-       INVITE retransmissions of rejected calls (Reported by Torrey
-       Searle)
-  * ASTERISK-23768 - [patch] Asterisk man page contains a (new)
-       unquoted minus sign (Reported by Jeremy Lainé)
-  * ASTERISK-24357 - [fax] Out of bounds error in update_modem_bits
-       (Reported by Jeremy Lainé)
-  * ASTERISK-22945 - [patch] Memory leaks in chan_sip.c with
-       realtime peers (Reported by ibercom)
-  * ASTERISK-24390 - astobj2: REF_DEBUG reports false leaks with
-       ao2_callback with OBJ_MULTIPLE (Reported by Corey Farrell)
-  * ASTERISK-24011 - [patch]safe_asterisk tries to set ulimit -n too
-       high on linux systems with lots of RAM (Reported by Michael
-       Myles)
-  * ASTERISK-20784 - Failure to receive an ACK to a SIP Re-INVITE
-       results in a SIP channel leak (Reported by NITESH BANSAL)
-  * ASTERISK-15879 - [patch] Failure to receive an ACK to a SIP
-       Re-INVITE results in a SIP channel leak (Reported by Torrey
-       Searle)
-  * ASTERISK-24406 - Some caller ID strings are parsed differently
-       since 11.13.0 (Reported by Etienne Lessard)
-  * ASTERISK-24325 - res_calendar_ews: cannot be used with neon 0.30
-       (Reported by Tzafrir Cohen)
-  * ASTERISK-13797 - [patch] relax badshell tilde test (Reported by
-       Tzafrir Cohen)
-  * ASTERISK-22791 - asterisk sends Re-INVITE after receiving a BYE
-       (Reported by Paolo Compagnini)
-  * ASTERISK-18923 - res_fax_spandsp usage counter is wrong
-       (Reported by Grigoriy Puzankin)
-  * ASTERISK-24393 - rtptimeout=0 doesn't disable rtptimeout
-       (Reported by Dmitry Melekhov)
-  * ASTERISK-24063 - [patch]Asterisk does not respect outbound proxy
-       when sending qualify requests (Reported by Damian Ivereigh)
-  * ASTERISK-24425 - [patch] jabber/xmpp to use TLS instead of
-       SSLv3, security fix POODLE (CVE-2014-3566) (Reported by
-       abelbeck)
-  * ASTERISK-24436 - Missing header in res/res_srtp.c when compiling
-       against libsrtp-1.5.0 (Reported by Patrick Laimbock)
-  * ASTERISK-21721 - SIP Failed to parse multiple Supported: headers
-       (Reported by Olle Johansson)
-  * ASTERISK-24190 - IMAP voicemail causes segfault (Reported by
-       Nick Adams)
-  * ASTERISK-24432 - Install refcounter.py when REF_DEBUG is enabled
-       (Reported by Corey Farrell)
-  * ASTERISK-24476 - main/app.c / app_voicemail: ast_writestream
-       leaks (Reported by Corey Farrell)
-  * ASTERISK-24307 - Unintentional memory retention in stringfields
-       (Reported by Etienne Lessard)
-
- For a full list of changes in this release, please see the ChangeLog:
-
- http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.32.0
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1044204 - Asterisk needs to be updated to pick up fixes to multiple security vulnerabilities
        https://bugzilla.redhat.com/show_bug.cgi?id=1044204
  [ 2 ] Bug #1166693 - asterisk: AMI permission escalation through DB dialplan function [AST-2014-018] [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1166693
  [ 3 ] Bug #1154895 - asterisk vulnerable to CVE-2014-3566/POODLE (AST-2014-011)
        https://bugzilla.redhat.com/show_bug.cgi?id=1154895
  [ 4 ] Bug #1109286 - CVE-2014-4047 asterisk: DoS due to Exhaustion of Allowed Concurrent HTTP Connections (AST-2014-007) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1109286
--------------------------------------------------------------------------------


================================================================================
 backupninja-1.0.1-5.el6 (FEDORA-EPEL-2014-4253)
 Lightweight, extensible backup system
--------------------------------------------------------------------------------
Update Information:

backupninja: added patch for RH-system specific
--------------------------------------------------------------------------------
ChangeLog:

* Fri Nov 21 2014 Denis Fateyev <denis at fateyev.com> - 1.0.1-5
- Added patch for RH-system specific
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1155010 - References to apt-get and dpkg still present in build
        https://bugzilla.redhat.com/show_bug.cgi?id=1155010
--------------------------------------------------------------------------------


================================================================================
 facter-1.6.18-8.el6 (FEDORA-EPEL-2014-4242)
 Command and ruby library for gathering system information
--------------------------------------------------------------------------------
Update Information:

1107891 - Enabled accidentally removed patch for CVE-2014-3248
--------------------------------------------------------------------------------
ChangeLog:

* Mon Nov 24 2014 Lukas Zapletal <lzap+rpm at redhat.com> 1.6.18-8
- 1107891 - Enabled accidentally removed patch for CVE-2014-3248
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1107891 - CVE-2014-3248 facter: puppet: Ruby modules could be loaded from the current working directory [fedora-19]
        https://bugzilla.redhat.com/show_bug.cgi?id=1107891
--------------------------------------------------------------------------------


================================================================================
 fedora-packager-0.5.10.5-1.el6 (FEDORA-EPEL-2014-4246)
 Tools for setting up a fedora maintainer environment
--------------------------------------------------------------------------------
Update Information:

remove fedora-cvs script as the cvs server no longer exists (dennis)
Make fas url configurable for fedora-server-ca.cert. (rbean)
Remove unused imports. (rbean)
Remove another unused import. (rbean)
Conditionalize CRL checking for el6. (rbean)
Remove unused imports. (rbean)
Add CRL checking to fedora-cert. (rbean)
fedoradev-pkgowners: Update pkgdb URL (opensource)
--------------------------------------------------------------------------------
ChangeLog:

* Mon Nov 24 2014 Dennis Gilmore <dennis at ausil.us> - 0.5.10.5-1
- remove fedora-cvs script as the cvs server no longer exists (dennis)
- Make fas url configurable for fedora-server-ca.cert. (rbean)
- Remove unused imports. (rbean)
- Remove another unused import. (rbean)
- Conditionalize CRL checking for el6. (rbean)
- Remove unused imports. (rbean)
- Add CRL checking to fedora-cert. (rbean)
- fedoradev-pkgowners: Update pkgdb URL (opensource)
* Sat Jun  7 2014 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 0.5.10.4-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Sun Mar 23 2014 Nick Bebout <nb at fedoraproject.org> - 0.5.10.4-1
- fix fedora-burn-yubikey script to add -oserial-api-visible
* Tue Mar 18 2014 Nick Bebout <nb at fedoraproject.org> - 0.5.10.3-1
- fix fedora-burn-yubikey script to work with slot 2
* Thu Dec  5 2013 Denis Gilmore <dennis at ausil.us> - 0.5.10.2-1
- update to 0.5.10.2
- drop sparc support
* Sat Aug  3 2013 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 0.5.10.1-4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
* Wed Feb 13 2013 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 0.5.10.1-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild
* Thu Jan  3 2013 Adam Jackson <ajax at redhat.com> 0.5.10.1-2
- Requires: packagedb-cli (which also pulls in python-bugzilla)
--------------------------------------------------------------------------------


================================================================================
 golang-googlecode-go-exp-0-0.3.hgbd8df7009305.el6 (FEDORA-EPEL-2014-4245)
 Experimental tools and packages for Go
--------------------------------------------------------------------------------
Update Information:

Extend import paths for golang.org/x/
Choose the correct architecture
--------------------------------------------------------------------------------
ChangeLog:

* Fri Nov 21 2014 jchaloup <jchaloup at redhat.com> - 0-0.3.hgbd8df7009305
- Extend import paths for golang.org/x/
  related: #1148481
* Sun Oct 26 2014 jchaloup <jchaloup at redhat.com> - 0-0.2.hgbd8df7009305
- Choose the correct architecture
  related: #1148481
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1148481 - Review Request: golang-googlecode-go-exp - Experimental tools and packages for Go
        https://bugzilla.redhat.com/show_bug.cgi?id=1148481
--------------------------------------------------------------------------------


================================================================================
 golang-googlecode-net-0-0.17.hg90e232e2462d.el6 (FEDORA-EPEL-2014-4241)
 Supplementary Go networking libraries
--------------------------------------------------------------------------------
Update Information:

Extend import paths for golang.org/x/
Resolves: rhbz#1147193 - update to latest upstream revision
--------------------------------------------------------------------------------
ChangeLog:

* Mon Nov 24 2014 jchaloup <jchaloup at redhat.com> - 0-0.17.hg90e232e2462d
- Extend import paths for golang.org/x/
  related: #1009967
* Mon Sep 29 2014 Lokesh Mandvekar <lsm5 at fedoraproject.org> - 0-0.16.hg90e232e2462d
- Resolves: rhbz#1147193 - update to latest upstream revision 
  90e232e2462dedc03bf3c93358da62d54d55dfb6
- don't redefine gopath, don't own dirs owned by golang
- use golang >= 1.2.1-3 for golang specific rpm macros
- preserve timestamps of copied files
- br stuff from golang-googlecode-text
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1009967 - Review Request: golang-googlecode-net - Supplementary Go networking libraries
        https://bugzilla.redhat.com/show_bug.cgi?id=1009967
  [ 2 ] Bug #1147193 - update to at least version ad01a6fcc8a19d3a4478c836895ffe883bd2ceab
        https://bugzilla.redhat.com/show_bug.cgi?id=1147193
--------------------------------------------------------------------------------


================================================================================
 golang-googlecode-text-0-0.2.hg024681b033be.el6 (FEDORA-EPEL-2014-4254)
 Supplementary Go text libraries
--------------------------------------------------------------------------------
Update Information:

Extend import paths for golang.org/x/
--------------------------------------------------------------------------------
ChangeLog:

* Fri Nov 21 2014 jchaloup <jchaloup at redhat.com> - 0-0.2.hg024681b033be
- Extend import paths for golang.org/x/
- Choose the correct architecture
  related: #1056285
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1056285 - Review Request: golang-googlecode-text - Supplementary Go text libraries
        https://bugzilla.redhat.com/show_bug.cgi?id=1056285
--------------------------------------------------------------------------------


================================================================================
 owncloud-6.0.6-1.el6 (FEDORA-EPEL-2014-2069)
 Private file sync and share server
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
ChangeLog:

* Sun Nov 23 2014 Adam Williamson <awilliam at redhat.com> - 6.0.6-1
- new upstream release 6.0.6
* Wed Oct 29 2014 Adam Williamson <awilliam at redhat.com> - 6.0.5-4
- clean up sub-package descriptions a bit more
* Wed Oct 29 2014 Adam Williamson <awilliam at redhat.com> - 6.0.5-3
- don't depend on database server packages, explain pgsql 9.x situation
- improve database docs (from master, tweaked for EL 6)
- improve README file
- don't check for working .htaccess (not relevant to a packaged OC)
* Wed Oct 29 2014 Adam Williamson <awilliam at redhat.com> - 6.0.5-2
- fix selinux restorecon to affect directory as well as config file
* Wed Oct 29 2014 Adam Williamson <awilliam at redhat.com> - 6.0.5-1
- new release 6.0.5
- set selinux context for config directory (not just file) on EPEL
- disable update checker in config file
- upstream isn't shipping 'updater' in this release, so drop...dropping it
* Tue Jul 29 2014 Adam Williamson <awilliam at redhat.com> - 6.0.4-3
- do not ship upstream's 'updater' app (it'll only lead to tears)
* Tue Jul 29 2014 Adam Williamson <awilliam at redhat.com> - 6.0.4-2
- don't patch the sample config, just include a stub with our settings
* Mon Jun 30 2014 Gregor Tätzner <brummbq at fedoraproject.org> - 6.0.4-1
- 6.0.4
* Sat Jun  7 2014 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 6.0.3-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Thu May  1 2014 Gregor Tätzner <brummbq at fedoraproject.org> - 6.0.3-1
- 6.0.3
- update symfony routing patch
* Tue Mar  4 2014 Gregor Tätzner <brummbq at fedoraproject.org> - 6.0.2-1
- 6.0.2
* Mon Feb 24 2014 Adam Williamson <awilliam at redhat.com> - 6.0.1-3
- set a minimum ver on the DBAL req for safety (using with 2.3 is dangerous)
* Mon Jan 27 2014 Adam Williamson <awilliam at redhat.com> - 6.0.1-2
- unbundle phpseclib (packaged now)
* Thu Jan 23 2014 Gregor Tätzner <brummbq at fedoraproject.org> - 6.0.1-1
- 6.0.1
* Tue Jan 14 2014 Gregor Tätzner <brummbq at fedoraproject.org>  - 6.0.0a-9
- fix routing with symfony 2.3
* Fri Jan 10 2014 Adam Williamson <awilliam at redhat.com> - 6.0.0a-8
- make a warning OC keeps triggering into a debug message
* Thu Jan  9 2014 Adam Williamson <awilliam at redhat.com> - 6.0.0a-7
- re-enable irods, patch loading of it, add dependency on it
* Fri Jan  3 2014 Adam Williamson <awilliam at redhat.com> - 6.0.0a-6
- disable irods a bit harder
* Fri Jan  3 2014 Adam Williamson <awilliam at redhat.com> - 6.0.0a-5
- drop non-existent OC_User_IMAP from config file
* Fri Jan  3 2014 Adam Williamson <awilliam at redhat.com> - 6.0.0a-4
- apps_3rdparty_includes: fix more 3rdparty loading stuff
- disable_irods: disable storage app's irods (it's broken)
* Mon Dec 30 2013 Adam Williamson <awilliam at redhat.com> - 6.0.0a-3
- tar-include, blowfish-include, dropbox-include: fix more paths
* Mon Dec 30 2013 Adam Williamson <awilliam at redhat.com> - 6.0.0a-2
- dropbox-include.patch: fix loading of system copy of php-Dropbox
* Sun Dec 22 2013 Adam Williamson <awilliam at redhat.com> - 6.0.0a-1
- 6.0.0a
* Sun Dec 22 2013 Gregor Tätzner <brummbq at fedoraproject.org> - 6.0.0-1
- 6.0.0
* Fri Dec 20 2013 Adam Williamson <awilliam at redhat.com> - 5.0.14a-2
- Correct location of php-symfony-routing: #1045301
* Fri Dec 20 2013 Adam Williamson <awilliam at redhat.com> - 5.0.14a-1
- 5.0.14a
* Sat Nov 16 2013 Gregor Tätzner <brummbq at fedoraproject.org> - 5.0.13-1
- 5.0.13
* Tue Oct  8 2013 Gregor Tätzner <brummbq at fedoraproject.org> - 5.0.12-1
- 5.0.12
* Tue Sep 24 2013 Gregor Tätzner <brummbq at fedoraproject.org> - 5.0.11-2
- keep MDB2/pgsql driver, genuine version causes upgrade problems (RBZ#962082)
* Sat Sep  7 2013 Gregor Tätzner <brummbq at fedoraproject.org> - 5.0.11-1
- 5.0.11
* Wed Sep  4 2013 Gregor Tätzner <brummbq at fedoraproject.org> - 5.0.10-4
- unbundle sabredav again
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 php-channel-phpseclib-1.3-1.el6 (FEDORA-EPEL-2014-2069)
 Adds the phpseclib channel to PEAR
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 php-horde-Horde-Core-2.17.0-1.el6 (FEDORA-EPEL-2014-4248)
 Horde Core Framework libraries
--------------------------------------------------------------------------------
Update Information:

Horde_Mail 2.5.0
* [mms] Added Horde_Mail_Rfc822_List#first() function.
* [mms] Add property to address object to indicate whether it is an EAI address.
* [mms] Transport driver now indicates whether it handles EAI data.
* [mms] Support validation of EAI addresses (RFC 6532).
* [mms] Add Horde_Mail_Mbox_Parse.

Horde_Mime 2.5.1
* [mms] Fix Horde_Mime_Headers_Deprecated#addReceivedHeader().
* [mms] Fix Horde_Mime_Headers_Deprecated#listHeadersExists().

Horde_Mime 2.5.0
* [mms] Horde_Mime_Headers has been rewritten.
* [mms] Correctly handle content parameters in a case-insensitive manner.
* [mms] Correctly pass the 'no_body' parameter to parts embedded in a message/rfc822 part in Horde_Mime_Part#parseMessage().
* [mms] Fix parsing a base MIME-compliant message with no Content-Type information.
* [mms] Horde_Mime::is8bit() no longer requires the charset parameter.
* [mms] Improved MIME encoding.
* [mms] Deprecated Horde_Mime::quotedPrintableEncode() and move to Horde_Mime_QuotedPrintable.
* [mms] Moved MIME ID manipulation/query methods out of Horde_Mime and into Horde_Mime_Id.
* [mms] Use string-based ABNF-based parser for scanning MIME content parameters instead of a regular expression (Bug #13587).
* [mms] Moved content parameter handling methods out of Horde_Mime and into Horde_Mime_ContentParam.
* [mms] Deprecated Horde_Mime::generateMessageId() and move to Horde_Mime_Headers.
* [mms] Deprecated Horde_Mime::uudecode() and move to new Horde_Mime_Uudecode class.
* [mms] Add Auto-Submitted header to outgoing MDN messages.

Horde_Smtp 1.7.0
* [mms] Added Horde_Smtp_Exception property indicating whether error is permanent or transient.
* [mms] Determine EAI and Body transport information by analyzing the message data, instead of requiring a parameter.
* [mms] Add support for ETRN extension (RFC 1985).
* [mms] Add support for BINARYMIME extension (RFC 3030).
* [mms] Add support for CHUNKING extension (RFC 3030).

Horde_ListHeaders 1.2.0
* [mms] Added Horde_ListHeaders#listHeadersExist().

Horde_Core 2.17.0
* [mjr] Fix issue that could cause incorrect truncation of ActiveSync emails.
* [mms] Added Horde_Core_Mime_Headers_Received.
* [mms] Added Horde_Registry#remoteHost().

Horde_Core 2.16.1:
* [mms] Fix file permissions of dynamically generated static CSS/JS files.
* [jan] Use correct user name as a fallback for identity full names with existing authusername hook.

Horde_Core 2.16.0:
* [mjr] Add the activesync_provisioning_check hook.
* [mjr] Fix determining multiplex settting for EAS notes (Bug #13637).
* [mjr] Fix adding new tasklists from EAS (Bug #13642).
* [jan] Update Czech translation (Michael Grafnetter).

Horde_Imap_Client 2.25.4
* [mms] Better error handling when IMAP connection is prematurely disconnected.
* [mms] Fix regression in listMailboxes() for POP3 servers when 'flat' option is true.

Horde_Imap_Client 2.25.3
* [mms] Fix determining whether a command requires a continuation request, when the literal occurs within a nested list.
* [mms] Ensure we don't use the same authentication method multiple times when logging into IMAP server.

--------------------------------------------------------------------------------
ChangeLog:

* Sun Nov 23 2014 Remi Collet <remi at fedoraproject.org> - 2.17.0-1
- Update to 2.17.0
- raise dependency on Horde_Mime >= 2.5.0
* Thu Nov  6 2014 Remi Collet <remi at fedoraproject.org> - 2.16.1-1
- Update to 2.16.1
- raise dependency on Horde_Translation >= 2.2.0
--------------------------------------------------------------------------------


================================================================================
 php-horde-Horde-Imap-Client-2.25.4-1.el6 (FEDORA-EPEL-2014-4248)
 Horde IMAP abstraction interface
--------------------------------------------------------------------------------
Update Information:

Horde_Mail 2.5.0
* [mms] Added Horde_Mail_Rfc822_List#first() function.
* [mms] Add property to address object to indicate whether it is an EAI address.
* [mms] Transport driver now indicates whether it handles EAI data.
* [mms] Support validation of EAI addresses (RFC 6532).
* [mms] Add Horde_Mail_Mbox_Parse.

Horde_Mime 2.5.1
* [mms] Fix Horde_Mime_Headers_Deprecated#addReceivedHeader().
* [mms] Fix Horde_Mime_Headers_Deprecated#listHeadersExists().

Horde_Mime 2.5.0
* [mms] Horde_Mime_Headers has been rewritten.
* [mms] Correctly handle content parameters in a case-insensitive manner.
* [mms] Correctly pass the 'no_body' parameter to parts embedded in a message/rfc822 part in Horde_Mime_Part#parseMessage().
* [mms] Fix parsing a base MIME-compliant message with no Content-Type information.
* [mms] Horde_Mime::is8bit() no longer requires the charset parameter.
* [mms] Improved MIME encoding.
* [mms] Deprecated Horde_Mime::quotedPrintableEncode() and move to Horde_Mime_QuotedPrintable.
* [mms] Moved MIME ID manipulation/query methods out of Horde_Mime and into Horde_Mime_Id.
* [mms] Use string-based ABNF-based parser for scanning MIME content parameters instead of a regular expression (Bug #13587).
* [mms] Moved content parameter handling methods out of Horde_Mime and into Horde_Mime_ContentParam.
* [mms] Deprecated Horde_Mime::generateMessageId() and move to Horde_Mime_Headers.
* [mms] Deprecated Horde_Mime::uudecode() and move to new Horde_Mime_Uudecode class.
* [mms] Add Auto-Submitted header to outgoing MDN messages.

Horde_Smtp 1.7.0
* [mms] Added Horde_Smtp_Exception property indicating whether error is permanent or transient.
* [mms] Determine EAI and Body transport information by analyzing the message data, instead of requiring a parameter.
* [mms] Add support for ETRN extension (RFC 1985).
* [mms] Add support for BINARYMIME extension (RFC 3030).
* [mms] Add support for CHUNKING extension (RFC 3030).

Horde_ListHeaders 1.2.0
* [mms] Added Horde_ListHeaders#listHeadersExist().

Horde_Core 2.17.0
* [mjr] Fix issue that could cause incorrect truncation of ActiveSync emails.
* [mms] Added Horde_Core_Mime_Headers_Received.
* [mms] Added Horde_Registry#remoteHost().

Horde_Core 2.16.1:
* [mms] Fix file permissions of dynamically generated static CSS/JS files.
* [jan] Use correct user name as a fallback for identity full names with existing authusername hook.

Horde_Core 2.16.0:
* [mjr] Add the activesync_provisioning_check hook.
* [mjr] Fix determining multiplex settting for EAS notes (Bug #13637).
* [mjr] Fix adding new tasklists from EAS (Bug #13642).
* [jan] Update Czech translation (Michael Grafnetter).

Horde_Imap_Client 2.25.4
* [mms] Better error handling when IMAP connection is prematurely disconnected.
* [mms] Fix regression in listMailboxes() for POP3 servers when 'flat' option is true.

Horde_Imap_Client 2.25.3
* [mms] Fix determining whether a command requires a continuation request, when the literal occurs within a nested list.
* [mms] Ensure we don't use the same authentication method multiple times when logging into IMAP server.

--------------------------------------------------------------------------------
ChangeLog:

* Sun Nov 23 2014 Remi Collet <remi at fedoraproject.org> - 2.25.4-1
- Update to 2.25.4
- raise dependency on Horde_Mime >= 2.5.0
* Tue Nov 11 2014 Remi Collet <remi at fedoraproject.org> - 2.25.3-1
- Update to 2.25.3
- raise dependency on Horde_Translation >= 2.2.0
--------------------------------------------------------------------------------


================================================================================
 php-horde-Horde-ListHeaders-1.2.0-1.el6 (FEDORA-EPEL-2014-4248)
 Horde List Headers Parsing Library
--------------------------------------------------------------------------------
Update Information:

Horde_Mail 2.5.0
* [mms] Added Horde_Mail_Rfc822_List#first() function.
* [mms] Add property to address object to indicate whether it is an EAI address.
* [mms] Transport driver now indicates whether it handles EAI data.
* [mms] Support validation of EAI addresses (RFC 6532).
* [mms] Add Horde_Mail_Mbox_Parse.

Horde_Mime 2.5.1
* [mms] Fix Horde_Mime_Headers_Deprecated#addReceivedHeader().
* [mms] Fix Horde_Mime_Headers_Deprecated#listHeadersExists().

Horde_Mime 2.5.0
* [mms] Horde_Mime_Headers has been rewritten.
* [mms] Correctly handle content parameters in a case-insensitive manner.
* [mms] Correctly pass the 'no_body' parameter to parts embedded in a message/rfc822 part in Horde_Mime_Part#parseMessage().
* [mms] Fix parsing a base MIME-compliant message with no Content-Type information.
* [mms] Horde_Mime::is8bit() no longer requires the charset parameter.
* [mms] Improved MIME encoding.
* [mms] Deprecated Horde_Mime::quotedPrintableEncode() and move to Horde_Mime_QuotedPrintable.
* [mms] Moved MIME ID manipulation/query methods out of Horde_Mime and into Horde_Mime_Id.
* [mms] Use string-based ABNF-based parser for scanning MIME content parameters instead of a regular expression (Bug #13587).
* [mms] Moved content parameter handling methods out of Horde_Mime and into Horde_Mime_ContentParam.
* [mms] Deprecated Horde_Mime::generateMessageId() and move to Horde_Mime_Headers.
* [mms] Deprecated Horde_Mime::uudecode() and move to new Horde_Mime_Uudecode class.
* [mms] Add Auto-Submitted header to outgoing MDN messages.

Horde_Smtp 1.7.0
* [mms] Added Horde_Smtp_Exception property indicating whether error is permanent or transient.
* [mms] Determine EAI and Body transport information by analyzing the message data, instead of requiring a parameter.
* [mms] Add support for ETRN extension (RFC 1985).
* [mms] Add support for BINARYMIME extension (RFC 3030).
* [mms] Add support for CHUNKING extension (RFC 3030).

Horde_ListHeaders 1.2.0
* [mms] Added Horde_ListHeaders#listHeadersExist().

Horde_Core 2.17.0
* [mjr] Fix issue that could cause incorrect truncation of ActiveSync emails.
* [mms] Added Horde_Core_Mime_Headers_Received.
* [mms] Added Horde_Registry#remoteHost().

Horde_Core 2.16.1:
* [mms] Fix file permissions of dynamically generated static CSS/JS files.
* [jan] Use correct user name as a fallback for identity full names with existing authusername hook.

Horde_Core 2.16.0:
* [mjr] Add the activesync_provisioning_check hook.
* [mjr] Fix determining multiplex settting for EAS notes (Bug #13637).
* [mjr] Fix adding new tasklists from EAS (Bug #13642).
* [jan] Update Czech translation (Michael Grafnetter).

Horde_Imap_Client 2.25.4
* [mms] Better error handling when IMAP connection is prematurely disconnected.
* [mms] Fix regression in listMailboxes() for POP3 servers when 'flat' option is true.

Horde_Imap_Client 2.25.3
* [mms] Fix determining whether a command requires a continuation request, when the literal occurs within a nested list.
* [mms] Ensure we don't use the same authentication method multiple times when logging into IMAP server.

--------------------------------------------------------------------------------
ChangeLog:

* Sun Nov 23 2014 Remi Collet <remi at fedoraproject.org> - 1.2.0-1
- Update to 1.2.0
- raise dependency on Horde_Translation >= 2.2.0
--------------------------------------------------------------------------------


================================================================================
 php-horde-Horde-Mail-2.5.0-1.el6 (FEDORA-EPEL-2014-4248)
 Horde Mail Library
--------------------------------------------------------------------------------
Update Information:

Horde_Mail 2.5.0
* [mms] Added Horde_Mail_Rfc822_List#first() function.
* [mms] Add property to address object to indicate whether it is an EAI address.
* [mms] Transport driver now indicates whether it handles EAI data.
* [mms] Support validation of EAI addresses (RFC 6532).
* [mms] Add Horde_Mail_Mbox_Parse.

Horde_Mime 2.5.1
* [mms] Fix Horde_Mime_Headers_Deprecated#addReceivedHeader().
* [mms] Fix Horde_Mime_Headers_Deprecated#listHeadersExists().

Horde_Mime 2.5.0
* [mms] Horde_Mime_Headers has been rewritten.
* [mms] Correctly handle content parameters in a case-insensitive manner.
* [mms] Correctly pass the 'no_body' parameter to parts embedded in a message/rfc822 part in Horde_Mime_Part#parseMessage().
* [mms] Fix parsing a base MIME-compliant message with no Content-Type information.
* [mms] Horde_Mime::is8bit() no longer requires the charset parameter.
* [mms] Improved MIME encoding.
* [mms] Deprecated Horde_Mime::quotedPrintableEncode() and move to Horde_Mime_QuotedPrintable.
* [mms] Moved MIME ID manipulation/query methods out of Horde_Mime and into Horde_Mime_Id.
* [mms] Use string-based ABNF-based parser for scanning MIME content parameters instead of a regular expression (Bug #13587).
* [mms] Moved content parameter handling methods out of Horde_Mime and into Horde_Mime_ContentParam.
* [mms] Deprecated Horde_Mime::generateMessageId() and move to Horde_Mime_Headers.
* [mms] Deprecated Horde_Mime::uudecode() and move to new Horde_Mime_Uudecode class.
* [mms] Add Auto-Submitted header to outgoing MDN messages.

Horde_Smtp 1.7.0
* [mms] Added Horde_Smtp_Exception property indicating whether error is permanent or transient.
* [mms] Determine EAI and Body transport information by analyzing the message data, instead of requiring a parameter.
* [mms] Add support for ETRN extension (RFC 1985).
* [mms] Add support for BINARYMIME extension (RFC 3030).
* [mms] Add support for CHUNKING extension (RFC 3030).

Horde_ListHeaders 1.2.0
* [mms] Added Horde_ListHeaders#listHeadersExist().

Horde_Core 2.17.0
* [mjr] Fix issue that could cause incorrect truncation of ActiveSync emails.
* [mms] Added Horde_Core_Mime_Headers_Received.
* [mms] Added Horde_Registry#remoteHost().

Horde_Core 2.16.1:
* [mms] Fix file permissions of dynamically generated static CSS/JS files.
* [jan] Use correct user name as a fallback for identity full names with existing authusername hook.

Horde_Core 2.16.0:
* [mjr] Add the activesync_provisioning_check hook.
* [mjr] Fix determining multiplex settting for EAS notes (Bug #13637).
* [mjr] Fix adding new tasklists from EAS (Bug #13642).
* [jan] Update Czech translation (Michael Grafnetter).

Horde_Imap_Client 2.25.4
* [mms] Better error handling when IMAP connection is prematurely disconnected.
* [mms] Fix regression in listMailboxes() for POP3 servers when 'flat' option is true.

Horde_Imap_Client 2.25.3
* [mms] Fix determining whether a command requires a continuation request, when the literal occurs within a nested list.
* [mms] Ensure we don't use the same authentication method multiple times when logging into IMAP server.

--------------------------------------------------------------------------------
ChangeLog:

* Sun Nov 23 2014 Remi Collet <remi at fedoraproject.org> - 2.5.0-1
- Update to 2.5.0
- add dependency on Horde_Translation
--------------------------------------------------------------------------------


================================================================================
 php-horde-Horde-Mime-2.5.1-1.el6 (FEDORA-EPEL-2014-4248)
 Horde MIME Library
--------------------------------------------------------------------------------
Update Information:

Horde_Mail 2.5.0
* [mms] Added Horde_Mail_Rfc822_List#first() function.
* [mms] Add property to address object to indicate whether it is an EAI address.
* [mms] Transport driver now indicates whether it handles EAI data.
* [mms] Support validation of EAI addresses (RFC 6532).
* [mms] Add Horde_Mail_Mbox_Parse.

Horde_Mime 2.5.1
* [mms] Fix Horde_Mime_Headers_Deprecated#addReceivedHeader().
* [mms] Fix Horde_Mime_Headers_Deprecated#listHeadersExists().

Horde_Mime 2.5.0
* [mms] Horde_Mime_Headers has been rewritten.
* [mms] Correctly handle content parameters in a case-insensitive manner.
* [mms] Correctly pass the 'no_body' parameter to parts embedded in a message/rfc822 part in Horde_Mime_Part#parseMessage().
* [mms] Fix parsing a base MIME-compliant message with no Content-Type information.
* [mms] Horde_Mime::is8bit() no longer requires the charset parameter.
* [mms] Improved MIME encoding.
* [mms] Deprecated Horde_Mime::quotedPrintableEncode() and move to Horde_Mime_QuotedPrintable.
* [mms] Moved MIME ID manipulation/query methods out of Horde_Mime and into Horde_Mime_Id.
* [mms] Use string-based ABNF-based parser for scanning MIME content parameters instead of a regular expression (Bug #13587).
* [mms] Moved content parameter handling methods out of Horde_Mime and into Horde_Mime_ContentParam.
* [mms] Deprecated Horde_Mime::generateMessageId() and move to Horde_Mime_Headers.
* [mms] Deprecated Horde_Mime::uudecode() and move to new Horde_Mime_Uudecode class.
* [mms] Add Auto-Submitted header to outgoing MDN messages.

Horde_Smtp 1.7.0
* [mms] Added Horde_Smtp_Exception property indicating whether error is permanent or transient.
* [mms] Determine EAI and Body transport information by analyzing the message data, instead of requiring a parameter.
* [mms] Add support for ETRN extension (RFC 1985).
* [mms] Add support for BINARYMIME extension (RFC 3030).
* [mms] Add support for CHUNKING extension (RFC 3030).

Horde_ListHeaders 1.2.0
* [mms] Added Horde_ListHeaders#listHeadersExist().

Horde_Core 2.17.0
* [mjr] Fix issue that could cause incorrect truncation of ActiveSync emails.
* [mms] Added Horde_Core_Mime_Headers_Received.
* [mms] Added Horde_Registry#remoteHost().

Horde_Core 2.16.1:
* [mms] Fix file permissions of dynamically generated static CSS/JS files.
* [jan] Use correct user name as a fallback for identity full names with existing authusername hook.

Horde_Core 2.16.0:
* [mjr] Add the activesync_provisioning_check hook.
* [mjr] Fix determining multiplex settting for EAS notes (Bug #13637).
* [mjr] Fix adding new tasklists from EAS (Bug #13642).
* [jan] Update Czech translation (Michael Grafnetter).

Horde_Imap_Client 2.25.4
* [mms] Better error handling when IMAP connection is prematurely disconnected.
* [mms] Fix regression in listMailboxes() for POP3 servers when 'flat' option is true.

Horde_Imap_Client 2.25.3
* [mms] Fix determining whether a command requires a continuation request, when the literal occurs within a nested list.
* [mms] Ensure we don't use the same authentication method multiple times when logging into IMAP server.

--------------------------------------------------------------------------------
ChangeLog:

* Mon Nov 24 2014 Remi Collet <remi at fedoraproject.org> - 2.5.1-1
- Update to 2.5.1
* Sun Nov 23 2014 Remi Collet <remi at fedoraproject.org> - 2.5.0-1
- Update to 2.5.0
- add dependency on Horde_ListHeaders
- raise dependency on Horde_Mail >= 2.5.0
- raise dependency on Horde_Translation >= 2.2.0
--------------------------------------------------------------------------------


================================================================================
 php-horde-Horde-Smtp-1.7.0-1.el6 (FEDORA-EPEL-2014-4248)
 Horde SMTP Client
--------------------------------------------------------------------------------
Update Information:

Horde_Mail 2.5.0
* [mms] Added Horde_Mail_Rfc822_List#first() function.
* [mms] Add property to address object to indicate whether it is an EAI address.
* [mms] Transport driver now indicates whether it handles EAI data.
* [mms] Support validation of EAI addresses (RFC 6532).
* [mms] Add Horde_Mail_Mbox_Parse.

Horde_Mime 2.5.1
* [mms] Fix Horde_Mime_Headers_Deprecated#addReceivedHeader().
* [mms] Fix Horde_Mime_Headers_Deprecated#listHeadersExists().

Horde_Mime 2.5.0
* [mms] Horde_Mime_Headers has been rewritten.
* [mms] Correctly handle content parameters in a case-insensitive manner.
* [mms] Correctly pass the 'no_body' parameter to parts embedded in a message/rfc822 part in Horde_Mime_Part#parseMessage().
* [mms] Fix parsing a base MIME-compliant message with no Content-Type information.
* [mms] Horde_Mime::is8bit() no longer requires the charset parameter.
* [mms] Improved MIME encoding.
* [mms] Deprecated Horde_Mime::quotedPrintableEncode() and move to Horde_Mime_QuotedPrintable.
* [mms] Moved MIME ID manipulation/query methods out of Horde_Mime and into Horde_Mime_Id.
* [mms] Use string-based ABNF-based parser for scanning MIME content parameters instead of a regular expression (Bug #13587).
* [mms] Moved content parameter handling methods out of Horde_Mime and into Horde_Mime_ContentParam.
* [mms] Deprecated Horde_Mime::generateMessageId() and move to Horde_Mime_Headers.
* [mms] Deprecated Horde_Mime::uudecode() and move to new Horde_Mime_Uudecode class.
* [mms] Add Auto-Submitted header to outgoing MDN messages.

Horde_Smtp 1.7.0
* [mms] Added Horde_Smtp_Exception property indicating whether error is permanent or transient.
* [mms] Determine EAI and Body transport information by analyzing the message data, instead of requiring a parameter.
* [mms] Add support for ETRN extension (RFC 1985).
* [mms] Add support for BINARYMIME extension (RFC 3030).
* [mms] Add support for CHUNKING extension (RFC 3030).

Horde_ListHeaders 1.2.0
* [mms] Added Horde_ListHeaders#listHeadersExist().

Horde_Core 2.17.0
* [mjr] Fix issue that could cause incorrect truncation of ActiveSync emails.
* [mms] Added Horde_Core_Mime_Headers_Received.
* [mms] Added Horde_Registry#remoteHost().

Horde_Core 2.16.1:
* [mms] Fix file permissions of dynamically generated static CSS/JS files.
* [jan] Use correct user name as a fallback for identity full names with existing authusername hook.

Horde_Core 2.16.0:
* [mjr] Add the activesync_provisioning_check hook.
* [mjr] Fix determining multiplex settting for EAS notes (Bug #13637).
* [mjr] Fix adding new tasklists from EAS (Bug #13642).
* [jan] Update Czech translation (Michael Grafnetter).

Horde_Imap_Client 2.25.4
* [mms] Better error handling when IMAP connection is prematurely disconnected.
* [mms] Fix regression in listMailboxes() for POP3 servers when 'flat' option is true.

Horde_Imap_Client 2.25.3
* [mms] Fix determining whether a command requires a continuation request, when the literal occurs within a nested list.
* [mms] Ensure we don't use the same authentication method multiple times when logging into IMAP server.

--------------------------------------------------------------------------------
ChangeLog:

* Sun Nov 23 2014 Remi Collet <remi at fedoraproject.org> - 1.7.0-1
- Update to 1.7.0
- raise dependency on Horde_Translation >= 2.2.0
--------------------------------------------------------------------------------


================================================================================
 php-horde-nag-4.2.3-1.el6 (FEDORA-EPEL-2014-4261)
 A web based task list manager
--------------------------------------------------------------------------------
Update Information:

nag 4.2.3
* [mjr] Fix issue with initially creating nag_shares table.

--------------------------------------------------------------------------------
ChangeLog:

* Fri Nov 21 2014 Remi Collet <remi at fedoraproject.org> - 4.2.3-1
- Update to 4.2.3
--------------------------------------------------------------------------------


================================================================================
 php-irodsphp-3.3.0-0.4.beta1.el6 (FEDORA-EPEL-2014-2069)
 PHP client API for iRODS
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 php-opencloud-1.11.0-3.el6 (FEDORA-EPEL-2014-4257)
 PHP SDK for OpenStack/Rackspace APIs
--------------------------------------------------------------------------------
Update Information:

The PHP SDK should work with most OpenStack-based cloud deployments, though
it specifically targets the Rackspace public cloud. In general, whenever a
Rackspace deployment is substantially different than a pure OpenStack one,
a separate Rackspace subclass is provided so that you can still use the SDK
with a pure OpenStack instance (for example, see the OpenStack class (for
OpenStack) and the Rackspace subclass).
The PHP SDK should work with most OpenStack-based cloud deployments, though
it specifically targets the Rackspace public cloud. In general, whenever a
Rackspace deployment is substantially different than a pure OpenStack one,
a separate Rackspace subclass is provided so that you can still use the SDK
with a pure OpenStack instance (for example, see the OpenStack class (for
OpenStack) and the Rackspace subclass).
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1159522 - php-opencloud-1.11.0 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=1159522
--------------------------------------------------------------------------------


================================================================================
 php-phpseclib-crypt-aes-0.3.9-1.el6 (FEDORA-EPEL-2014-2069)
 Pure-PHP implementation of AES
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 php-phpseclib-crypt-base-0.3.9-1.el6 (FEDORA-EPEL-2014-2069)
 Base class for phpseclib cipher implementations
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 php-phpseclib-crypt-blowfish-0.3.9-2.el6 (FEDORA-EPEL-2014-2069)
 Pure-PHP implementation of Blowfish
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 php-phpseclib-crypt-des-0.3.9-2.el6 (FEDORA-EPEL-2014-2069)
 Pure-PHP implementation of DES
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 php-phpseclib-crypt-hash-0.3.9-1.el6 (FEDORA-EPEL-2014-2069)
 Pure-PHP implementations of keyed HMACs and hashing functions
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 php-phpseclib-crypt-random-0.3.9-1.el6 (FEDORA-EPEL-2014-2069)
 Random Number Generator
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 php-phpseclib-crypt-rc4-0.3.9-2.el6 (FEDORA-EPEL-2014-2069)
 Pure-PHP implementation of RC4
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 php-phpseclib-crypt-rijndael-0.3.9-2.el6 (FEDORA-EPEL-2014-2069)
 Pure-PHP implementation of Rijndael
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 php-phpseclib-crypt-rsa-0.3.9-1.el6 (FEDORA-EPEL-2014-2069)
 Pure-PHP PKCS#1 (v2.1) compliant implementation of RSA
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 php-phpseclib-crypt-tripledes-0.3.9-2.el6 (FEDORA-EPEL-2014-2069)
 Pure-PHP implementation of Triple DES
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 php-phpseclib-crypt-twofish-0.3.9-2.el6 (FEDORA-EPEL-2014-2069)
 Pure-PHP implementation of Twofish
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 php-phpseclib-math-biginteger-0.3.9-1.el6 (FEDORA-EPEL-2014-2069)
 Pure-PHP arbitrary precision integer arithmetic library
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 php-phpseclib-net-sftp-0.3.9-1.el6 (FEDORA-EPEL-2014-2069)
 Pure-PHP implementation of SFTP
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 php-phpseclib-net-ssh2-0.3.9-1.el6 (FEDORA-EPEL-2014-2069)
 Pure-PHP implementation of SSHv2
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 php-sabredav-Sabre_CalDAV-1.7.9-1.el6 (FEDORA-EPEL-2014-2069)
 Provides RFC4791 (CalDAV) support to Sabre_DAV
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
ChangeLog:

* Tue Oct 28 2014 Adam Williamson <awilliam at redhat.com> - 1.7.9-1
- new release 1.7.9 (from SabreDAV 1.7.13, EOL)
* Sat Jun  7 2014 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 1.7.8-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Thu Sep  5 2013 Joseph Marrero <jmarrero at fedoraproject.org> -	1.7.8-2
- fix package xml files	incorrectly tagged by myself  doc instead of php
* Tue Sep  3 2013 Joseph Marrero <jmarrero at fedoraproject.org> 1.7.8-1
- update to 1.7.8
- use our own package.xml provided by Remi Collet as upstream doesn't use pear anymore
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 php-sabredav-Sabre_CardDAV-1.7.9-2.el6 (FEDORA-EPEL-2014-2069)
 Provides CardDAV support to Sabre_DAV
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
ChangeLog:

* Tue Oct 28 2014 Adam Williamson <awilliam at redhat.com> - 1.7.9-1
- new release 1.7.9 (from SabreDAV 1.7.13, EOL)
* Sat Jun  7 2014 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 1.7.8-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Thu Sep  5 2013 Joseph Marrero <jmarrero at fedoraproject.org> -	1.7.8-2
- fix package xml files	incorrectly tagged by myself  doc instead of php
* Tue Sep  3 2013 Joseph Marrero <jmarrero at fedoraproject.org> 1.7.8-1
- update to 1.7.8
- use our own package.xml created by Remi Collet as upstream doesn't use pear anymore
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 php-sabredav-Sabre_DAV-1.7.13-1.el6 (FEDORA-EPEL-2014-2069)
 Sabre_DAV is a WebDAV framework for PHP
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
ChangeLog:

* Tue Oct 28 2014 Adam Williamson <awilliam at redhat.com> - 1.7.13-1
- new release 1.7.13 (EOL)
* Sat Jun  7 2014 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 1.7.8-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Thu Sep  5 2013 Joseph Marrero <jmarrero at fedoraproject.org> - 1.7.8-2
- fix package xml files incorrectly tagged by myself  doc instead of php
* Tue Sep  3 2013 Joseph Marrero <jmarrero at fedoraproject.org> - 1.7.8-1
- Update to 1.7.8 Uptream version
- Add own pear configuration provided by Remi Collet from RH
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 php-sabredav-Sabre_DAVACL-1.7.9-1.el6 (FEDORA-EPEL-2014-2069)
 RFC3744 implementation for SabreDAV
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
ChangeLog:

* Tue Oct 28 2014 Adam Williamson <awilliam at redhat.com> - 1.7.9-1
- new release 1.7.9 (from SabreDAV 1.7.13, EOL)
* Sat Jun  7 2014 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 1.7.8-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Tue Sep  3 2013 Joseph Marrero <jmarrero at fedoraproject.org> - 1.7.8-1
- Update to 1.7.8 Upstream version
- Add own pear configuration provided by Remi Collet from RH
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 php-sabredav-Sabre_HTTP-1.7.11-1.el6 (FEDORA-EPEL-2014-2069)
 HTTP component for the SabreDAV WebDAV framework for PHP
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
ChangeLog:

* Tue Oct 28 2014 Adam Williamson <awilliam at redhat.com> - 1.7.11-1
- new release 1.7.11 (from Sabre 1.7.13 EOL)
* Tue Sep  3 2013 Joseph Marrero <jmarrero at fedoraproject.org> - 1.7.3-1
- Update to 1.7.x Uptream version
- Add own pear configuration provided by Remi Collet from RH
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 php-sabredav-Sabre_VObject-2.1.4-2.el6 (FEDORA-EPEL-2014-2069)
 An intuitive reader for iCalendar and vCard objects
--------------------------------------------------------------------------------
Update Information:

This update provides ownCloud 6 for EL6. Ideally I'd rather actually do ownCloud 5, but I don't think I can go back, since OC 6 was already submitted. Upgrading from 4.5 directly to 6 may not work: if you have a 4.5 install you wish to upgrade I would recommend first upgrading to ownCloud 5 from my repository at https://www.happyassassin.net/temp/oc5_repo (wget https://www.happyassassin.net/temp/oc5_repo/oc5.repo in /etc/yum.repos.d/ ).

However you upgrade, *please* back up your user data, ownCloud configuration and database before running the upgrade.

IMPORTANT NOTE for those using the PostgreSQL database backend: ownCloud 6 requires PostgreSQL 9.0 or higher. The official EL 6 repositories contain only 8.4. You will need to use a remote server or third-party PostgreSQL 9.0 packages. If this presents a major problem for you, please get in touch, and we can look into possibilities, but I'm figuring probably most folks will have moved up to 9.x some way or another.

ownCloud 4.5 is no longer supported upstream and is known to have security vulnerabilities: a major version upgrade is required to keep the package maintainable.

The new ownCloud requires a newer SabreDAV, so this update provides the latest SabreDAV 1.7. This is an API-incompatible update to SabreDAV 1.6, but it cannot be avoided, and there is no package other than ownCloud which depends on SabreDAV in the official or EPEL repositories.

The changes between ownCloud 4.5 and 6.0 are far too numerous to list specifically: see the upstream site and the package changelog for more details.
--------------------------------------------------------------------------------
ChangeLog:

* Sat Jun  7 2014 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 2.1.4-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Thu May 22 2014 Remi Collet <remi at fedoraproject.org> 2.1.4-1
- update to 2.1.4
- sources from github
- fix upstream URL
* Wed Feb 12 2014 Joseph Marrero <jmarrero at fedoraproject.org> 2.1.3-1
- update to 2.1.3
* Tue Sep  3 2013 Joseph Marrero <jmarrero at fedoraproject.org> 2.1.0-1
- update to 2.1.0
- use our own package.xml created by Remi Collet as upstream doesn't use pear anymore
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1066982 - Upgrade owncloud
        https://bugzilla.redhat.com/show_bug.cgi?id=1066982
  [ 2 ] Bug #1035594 - owncloud: possible security bypass on admin page (5.0.13) [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=1035594
  [ 3 ] Bug #1109738 - owncloud dependencies are missing from epel6
        https://bugzilla.redhat.com/show_bug.cgi?id=1109738
  [ 4 ] Bug #1109502 - Upgrade php-pear-Sabre to 1.7.8
        https://bugzilla.redhat.com/show_bug.cgi?id=1109502
--------------------------------------------------------------------------------


================================================================================
 python-flask-rstpages-0.3-3.el6 (FEDORA-EPEL-2014-4240)
 Adds support for reStructuredText to a Flask application
--------------------------------------------------------------------------------
Update Information:

Add conditionals for EPEL
--------------------------------------------------------------------------------


================================================================================
 will-crash-0.9-2.el6 (FEDORA-EPEL-2014-4260)
 Set of crashing executables written in various languages
--------------------------------------------------------------------------------
Update Information:

fix will_java_throw_suppressed availability
--------------------------------------------------------------------------------
ChangeLog:

* Mon Nov 24 2014 Richard Marko <rmarko at fedoraproject.org> - 0.9-2
- fix will_java_throw_suppressed availability on RHEL6
* Thu Oct 30 2014 Jakub Filak <jfilak at redhat.com> - 0.9-1
- port to javapackages-utils
* Wed Sep 10 2014 Richard Marko <rmarko at fedoraproject.org> - 0.8-1
- add will_segfault --break-link-map
* Wed Aug 27 2014 Martin Milata <mmilata at redhat.com> - 0.7-5
- added will_stackoverflow
* Mon Aug 18 2014 Richard Marko <rmarko at fedoraproject.org> - 0.7-4
- support OpenJDK8
* Mon Aug 18 2014 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 0.7-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
* Sun Jun  8 2014 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 0.7-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
--------------------------------------------------------------------------------


================================================================================
 ykpers-1.16.1-1.el6 (FEDORA-EPEL-2014-4239)
 Yubikey personalization program
--------------------------------------------------------------------------------
Update Information:

Update to 1.16.1. Fixes bugs #1167113 and #1157894
--------------------------------------------------------------------------------
ChangeLog:

* Sun Nov 23 2014 Kevin Fenzi <kevin at scrye.com> 1.16.1-1
- Update to 1.16.1. Fixes bugs #1167113 and #1157894
* Thu Nov 28 2013 Maxim Burgerhout <wzzrd at fedoraproject.org> - 1.14.1-1             
- Update to 1.14.1                                                                  
- With dry-run option (-d) and new ykinfo options to view individual slots
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1167113 - Upgrade to 1.16.1 version in order to support 3.3.x firmware cards
        https://bugzilla.redhat.com/show_bug.cgi?id=1167113
  [ 2 ] Bug #1157894 - F20 - Yubikey U2F (FIDO) Not Supported
        https://bugzilla.redhat.com/show_bug.cgi?id=1157894
--------------------------------------------------------------------------------



More information about the epel-devel mailing list