The following Fedora EPEL 6 Security updates need testing: Age URL 893 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-7031 python-virtualenv-12.0.7-1.el6 887 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-7168 rubygem-crack-0.3.2-2.el6 777 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-e2b4b5b2fb mcollective-2.8.4-1.el6 749 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-35e240edd9 thttpd-2.25b-24.el6 359 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-e3e50897ac libbsd-0.8.3-2.el6 88 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-4c76ddcc92 libmspack-0.6-0.1.alpha.el6 15 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-9882374b91 wordpress-4.9.1-1.el6 15 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-678916467d exim-4.89-4.el6 8 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-ed87c07972 hostapd-2.6-7.el6 8 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-6aaee32b7e optipng-0.7.6-6.el6 8 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-3432442a31 shellinabox-2.20-5.el6 3 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-0143bce8ee python34-3.4.5-4.el6 0 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-40e722a985 json-c12-0.12.1-2.el6 The following builds have been pushed to Fedora EPEL 6 updates-testing json-c12-0.12.1-2.el6 Details about builds: ================================================================================ json-c12-0.12.1-2.el6 (FEDORA-EPEL-2017-40e722a985) JSON implementation in C (0.12 compatibility package) -------------------------------------------------------------------------------- Update Information: - Patch: - Avoid invalid free and crash explicitly instead of silently enabling the caller to commit undefined behaviour. -------------------------------------------------------------------------------- _______________________________________________ epel-devel mailing list -- epel-devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to epel-devel-leave@xxxxxxxxxxxxxxxxxxxxxxx