The following Fedora EPEL 5 Security updates need testing: Age URL 752 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2014-1626 puppet-2.7.26-1.el5 601 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2014-3849 sblim-sfcb-1.3.8-2.el5 244 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-edbea40516 mcollective-2.8.4-1.el5 216 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-582c8075e6 thttpd-2.25b-24.el5 10 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-8b221b73a3 wordpress-4.5.3-1.el5 8 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-98e2625a6f phpMyAdmin4-4.0.10.16-1.el5 0 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-ca8f71985b mbedtls-2.3.0-1.el5 0 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-c03e77f531 nginx-1.10.1-1.el5 The following builds have been pushed to Fedora EPEL 5 updates-testing nginx-1.10.1-1.el5 Details about builds: ================================================================================ nginx-1.10.1-1.el5 (FEDORA-EPEL-2016-c03e77f531) A high performance web server and reverse proxy server -------------------------------------------------------------------------------- Update Information: * Update to upstream release 1.10.1 * Split dynamic modules into subpackages -------------------------------------------------------------------------------- References: [ 1 ] Bug #1341462 - CVE-2016-4450 nginx: NULL pointer dereference while writing client request body https://bugzilla.redhat.com/show_bug.cgi?id=1341462 -------------------------------------------------------------------------------- _______________________________________________ epel-devel mailing list epel-devel@xxxxxxxxxxxxxxxxxxxxxxx https://lists.fedoraproject.org/admin/lists/epel-devel@xxxxxxxxxxxxxxxxxxxxxxx