[EPEL-devel] Fedora EPEL 5 updates-testing report

updates at fedoraproject.org updates at fedoraproject.org
Fri Aug 28 05:19:07 UTC 2015


The following Fedora EPEL 5 Security updates need testing:
 Age  URL
 677  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2013-11893   libguestfs-1.20.12-1.el5
 442  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2014-1626   puppet-2.7.26-1.el5
 291  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2014-3849   sblim-sfcb-1.3.8-2.el5
   9  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-7699   drupal6-views_bulk_operations-1.17-1.el5
   5  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-7734   drupal7-7.39-1.el5
   1  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-7804   drupal6-ctools-1.14-1.el5
   0  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-7825   drupal6-6.37-1.el5


The following builds have been pushed to Fedora EPEL 5 updates-testing

    drupal6-6.37-1.el5
    mozilla-https-everywhere-5.1.0-1.el5

Details about builds:


================================================================================
 drupal6-6.37-1.el5 (FEDORA-EPEL-2015-7825)
 An open-source content-management platform
--------------------------------------------------------------------------------
Update Information:

Maintenance and security release of the Drupal 6 series.  This release fixes
**security vulnerabilities**. Sites are [urged to upgrade
immediately](https://www.drupal.org/node/1494290) after reading the notes below
and the security announcement:  [Drupal Core - Critical - Multiple
Vulnerabilities - SA-CORE-2015-003](https://www.drupal.org/SA-CORE-2015-003) No
other fixes are included.  No changes have been made to the .htaccess,
robots.txt or default settings.php files in this release, so upgrading custom
versions of those files is not necessary.  #### Known issues:  None.  #### Major
changes since 6.36:  * For security reasons, the autocomplete system now makes
Ajax requests to non-clean URLs only, although protection is also in place for
custom code that does so using clean URLs. There is a new form API #process
function on autocomplete-enabled text fields that is required for the
autocomplete functionality to work; custom and contributed modules should ensure
that they are not overriding this #process function accidentally when altering
text fields on forms. Part of the security fix also includes changes to
theme_textfield(); it is recommended that sites which override this theme
function make those changes as well (see the theme_textfield section of this
diff for details). * When form API token validation fails (for example, when a
cross-site request forgery attempt is detected, or a user tries to submit a form
after having logged out and back in again in the meantime), the form API now
skips calling form element value callbacks, except for a select list of
callbacks provided by Drupal core that are known to be safe. In rare cases, this
could lead to data loss when a user submits a form and receives a token
validation error, but the overall effect is expected to be minor.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1255662 - CVE-2015-6658 CVE-2015-6659 CVE-2015-6660 CVE-2015-6661 CVE-2015-6665 drupal: Several issues in 6.x and 7.x (SA-CORE-2015-003)
        https://bugzilla.redhat.com/show_bug.cgi?id=1255662
--------------------------------------------------------------------------------


================================================================================
 mozilla-https-everywhere-5.1.0-1.el5 (FEDORA-EPEL-2015-7816)
 HTTPS/HSTS enforcement extension for Mozilla Firefox and SeaMonkey
--------------------------------------------------------------------------------
Update Information:

  mozilla-https-everywhere-5.1.0-1.el5  - Ruleset fixes - AMO signature
mozilla-https-everywhere-5.1.0-1.el6  - Ruleset fixes - AMO signature   mozilla-
https-everywhere-5.1.0-1.el7  - Ruleset fixes - AMO signature
--------------------------------------------------------------------------------



More information about the epel-devel mailing list