The following Fedora EPEL 7 Security updates need testing: Age URL 53 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2018-2c81054303 remctl-3.14-1.el7 14 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2018-8b8dc96235 nodejs-deep-extend-0.5.1-1.el7 8 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2018-860176245e gifsicle-1.91-1.el7 5 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2018-48b823c3dc strongswan-5.6.2-6.el7 4 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2018-90002f509e pdns-recursor-4.1.3-2.el7 4 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2018-74ee3ae47e phpMyAdmin-4.4.15.10-3.el7 2 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2018-65614e9fc9 thunderbird-enigmail-2.0.6-1.el7 2 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2018-bbdc0ecf38 cobbler-2.8.3-2.el7 The following builds have been pushed to Fedora EPEL 7 updates-testing airnef-1.1-2.el7 chromium-66.0.3359.181-3.el7 freeipa-desktop-profile-0.0.8-1.el7 htop-2.2.0-1.el7 python-distroinfo-0.0.1-3.el7 rust-1.26.1-2.el7 Details about builds: ================================================================================ airnef-1.1-2.el7 (FEDORA-EPEL-2018-4e79a8d043) Wireless download from your Nikon/Canon Camera -------------------------------------------------------------------------------- Update Information: download the images/videos from Nikon/Canon camers rhbz#1583475 -------------------------------------------------------------------------------- References: [ 1 ] Bug #1583475 - Review Request: airnef - Wireless download from your Nikon/Canon Camera https://bugzilla.redhat.com/show_bug.cgi?id=1583475 -------------------------------------------------------------------------------- ================================================================================ chromium-66.0.3359.181-3.el7 (FEDORA-EPEL-2018-297fb7f6c0) A WebKit (Blink) powered web browser -------------------------------------------------------------------------------- Update Information: Update to 66.0.3359.181. Security fix for CVE-2018-6085 CVE-2018-6086 CVE-2018-6087 CVE-2018-6088 CVE-2018-6089 CVE-2018-6090 CVE-2018-6091 CVE-2018-6092 CVE-2018-6093 CVE-2018-6094 CVE-2018-6095 CVE-2018-6096 CVE-2018-6097 CVE-2018-6098 CVE-2018-6099 CVE-2018-6100 CVE-2018-6101 CVE-2018-6102 CVE-2018-6103 CVE-2018-6104 CVE-2018-6105 CVE-2018-6106 CVE-2018-6107 CVE-2018-6108 CVE-2018-6109 CVE-2018-6110 CVE-2018-6111 CVE-2018-6112 CVE-2018-6113 CVE-2018-6114 CVE-2018-6116 CVE-2018-6117 CVE-2018-6118 CVE-2018-6120 CVE-2018-6121 CVE-2018-6122 -------------------------------------------------------------------------------- ChangeLog: * Tue May 29 2018 Tom Callaway <spot@xxxxxxxxxxxxxxxxx> 66.0.3359.181-3 - also filter out fontconfig on epel7 * Wed May 23 2018 Tom Callaway <spot@xxxxxxxxxxxxxxxxx> 66.0.3359.181-2 - fix missing files * Mon May 21 2018 Tom Callaway <spot@xxxxxxxxxxxxxxxxx> 66.0.3359.181-1 - update to 66.0.3359.181 * Tue May 15 2018 Tom Callaway <spot@xxxxxxxxxxxxxxxxx> 66.0.3359.170-2 - only x86_64 i686 have swiftshader - fix gcc8 alignof issue on i686 * Mon May 14 2018 Tom Callaway <spot@xxxxxxxxxxxxxxxxx> 66.0.3359.170-1 - update to 66.0.3359.170 - include swiftshader files * Tue May 1 2018 Tom Callaway <spot@xxxxxxxxxxxxxxxxx> 66.0.3359.139-1 - update to 66.0.3359.139 * Wed Apr 18 2018 Tom Callaway <spot@xxxxxxxxxxxxxxxxx> 66.0.3359.117-1 - update to 66.0.3359.117 * Tue Apr 17 2018 Tom Callaway <spot@xxxxxxxxxxxxxxxxx> 65.0.3325.181-3 - use system fontconfig (except on epel7) * Wed Apr 4 2018 Tom Callaway <spot@xxxxxxxxxxxxxxxxx> 65.0.3325.181-2 - add explicit dependency on minizip (bz 1534282) * Wed Mar 28 2018 Tom Callaway <spot@xxxxxxxxxxxxxxxxx> - check that there is no system 'google' module, shadowing bundled ones - conditionalize api keys (on by default) -------------------------------------------------------------------------------- References: [ 1 ] Bug #1577115 - CVE-2018-6120 chromium-browser: Heap buffer overflow in PDFium https://bugzilla.redhat.com/show_bug.cgi?id=1577115 [ 2 ] Bug #1577114 - CVE-2018-6122 chromium-browser: Type confusion in V8 https://bugzilla.redhat.com/show_bug.cgi?id=1577114 [ 3 ] Bug #1577113 - CVE-2018-6121 chromium-browser: Privilege Escalation in extensions https://bugzilla.redhat.com/show_bug.cgi?id=1577113 [ 4 ] Bug #1573856 - CVE-2018-6118 chromium-browser: Use after free in Media Cache https://bugzilla.redhat.com/show_bug.cgi?id=1573856 [ 5 ] Bug #1568797 - CVE-2018-6117 chromium-browser: Confusing autofill settings https://bugzilla.redhat.com/show_bug.cgi?id=1568797 [ 6 ] Bug #1568796 - CVE-2018-6116 chromium-browser: Incorrect low memory handling in WebAssembly https://bugzilla.redhat.com/show_bug.cgi?id=1568796 [ 7 ] Bug #1568795 - CVE-2018-6115 chromium-browser: SmartScreen bypass in downloads https://bugzilla.redhat.com/show_bug.cgi?id=1568795 [ 8 ] Bug #1568794 - CVE-2018-6114 chromium-browser: CSP bypass https://bugzilla.redhat.com/show_bug.cgi?id=1568794 [ 9 ] Bug #1568793 - CVE-2018-6113 chromium-browser: URL spoof in Navigation https://bugzilla.redhat.com/show_bug.cgi?id=1568793 [ 10 ] Bug #1568792 - CVE-2018-6112 chromium-browser: Incorrect URL handling in DevTools https://bugzilla.redhat.com/show_bug.cgi?id=1568792 [ 11 ] Bug #1568791 - CVE-2018-6111 chromium-browser: Heap-use-after-free in DevTools https://bugzilla.redhat.com/show_bug.cgi?id=1568791 [ 12 ] Bug #1568790 - CVE-2018-6110 chromium-browser: Incorrect handling of plaintext files via file:// https://bugzilla.redhat.com/show_bug.cgi?id=1568790 [ 13 ] Bug #1568789 - CVE-2018-6109 chromium-browser: Incorrect handling of files by FileAPI https://bugzilla.redhat.com/show_bug.cgi?id=1568789 [ 14 ] Bug #1568788 - CVE-2018-6108 chromium-browser: URL spoof in Omnibox https://bugzilla.redhat.com/show_bug.cgi?id=1568788 [ 15 ] Bug #1568787 - CVE-2018-6107 chromium-browser: URL spoof in Omnibox https://bugzilla.redhat.com/show_bug.cgi?id=1568787 [ 16 ] Bug #1568786 - CVE-2018-6106 chromium-browser: Incorrect handling of promises in V8 https://bugzilla.redhat.com/show_bug.cgi?id=1568786 [ 17 ] Bug #1568785 - CVE-2018-6105 chromium-browser: URL spoof in Omnibox https://bugzilla.redhat.com/show_bug.cgi?id=1568785 [ 18 ] Bug #1568782 - CVE-2018-6104 chromium-browser: URL spoof in Omnibox https://bugzilla.redhat.com/show_bug.cgi?id=1568782 [ 19 ] Bug #1568781 - CVE-2018-6103 chromium-browser: UI spoof in Permissions https://bugzilla.redhat.com/show_bug.cgi?id=1568781 [ 20 ] Bug #1568780 - CVE-2018-6102 chromium-browser: URL spoof in Omnibox https://bugzilla.redhat.com/show_bug.cgi?id=1568780 [ 21 ] Bug #1568779 - CVE-2018-6101 chromium-browser: Insufficient protection of remote debugging prototol in DevTools https://bugzilla.redhat.com/show_bug.cgi?id=1568779 [ 22 ] Bug #1568778 - CVE-2018-6100 chromium-browser: URL spoof in Omnibox https://bugzilla.redhat.com/show_bug.cgi?id=1568778 [ 23 ] Bug #1568777 - CVE-2018-6099 chromium-browser: CORS bypass in ServiceWorker https://bugzilla.redhat.com/show_bug.cgi?id=1568777 [ 24 ] Bug #1568776 - CVE-2018-6098 chromium-browser: URL spoof in Omnibox https://bugzilla.redhat.com/show_bug.cgi?id=1568776 [ 25 ] Bug #1568775 - CVE-2018-6097 chromium-browser: Fullscreen UI spoof https://bugzilla.redhat.com/show_bug.cgi?id=1568775 [ 26 ] Bug #1568774 - CVE-2018-6096 chromium-browser: Fullscreen UI spoof https://bugzilla.redhat.com/show_bug.cgi?id=1568774 [ 27 ] Bug #1568773 - CVE-2018-6095 chromium-browser: Lack of meaningful user interaction requirement before file upload https://bugzilla.redhat.com/show_bug.cgi?id=1568773 [ 28 ] Bug #1568771 - CVE-2018-6094 chromium-browser: Exploit hardening regression in Oilpan https://bugzilla.redhat.com/show_bug.cgi?id=1568771 [ 29 ] Bug #1568770 - CVE-2018-6093 chromium-browser: Same origin bypass in Service Worker https://bugzilla.redhat.com/show_bug.cgi?id=1568770 [ 30 ] Bug #1568769 - CVE-2018-6092 chromium-browser: Integer overflow in WebAssembly https://bugzilla.redhat.com/show_bug.cgi?id=1568769 [ 31 ] Bug #1568767 - CVE-2018-6091 chromium-browser: Incorrect handling of plug-ins by Service Worker https://bugzilla.redhat.com/show_bug.cgi?id=1568767 [ 32 ] Bug #1568766 - CVE-2018-6090 chromium-browser: Heap buffer overflow in Skia https://bugzilla.redhat.com/show_bug.cgi?id=1568766 [ 33 ] Bug #1568765 - CVE-2018-6089 chromium-browser: Same origin policy bypass in Service Worker https://bugzilla.redhat.com/show_bug.cgi?id=1568765 [ 34 ] Bug #1568764 - CVE-2018-6088 chromium-browser: Use after free in PDFium https://bugzilla.redhat.com/show_bug.cgi?id=1568764 [ 35 ] Bug #1568763 - CVE-2018-6087 chromium-browser: Use after free in WebAssembly https://bugzilla.redhat.com/show_bug.cgi?id=1568763 [ 36 ] Bug #1568762 - CVE-2018-6086 chromium-browser: Use after free in Disk Cache https://bugzilla.redhat.com/show_bug.cgi?id=1568762 [ 37 ] Bug #1568761 - CVE-2018-6085 chromium-browser: Use after free in Disk Cache https://bugzilla.redhat.com/show_bug.cgi?id=1568761 -------------------------------------------------------------------------------- ================================================================================ freeipa-desktop-profile-0.0.8-1.el7 (FEDORA-EPEL-2018-3b7d097e84) FleetCommander integration with FreeIPA -------------------------------------------------------------------------------- Update Information: Updated to version 0.0.8 ---- Updated to version 0.0.7 -------------------------------------------------------------------------------- ChangeLog: * Thu May 31 2018 Oliver Gutierrez <ogutierrez@xxxxxxxxxx> 0.0.8-1 - Updated to version 0.0.8 * Mon May 21 2018 Oliver Gutierrez <ogutierrez@xxxxxxxxxx> 0.0.7-1 - Updated to version 0.0.7 * Wed Feb 7 2018 Fedora Release Engineering <releng@xxxxxxxxxxxxxxxxx> - 0.0.6-5 - Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild -------------------------------------------------------------------------------- References: [ 1 ] Bug #1583872 - freeipa-desktop-profile-0.0.8 is available https://bugzilla.redhat.com/show_bug.cgi?id=1583872 -------------------------------------------------------------------------------- ================================================================================ htop-2.2.0-1.el7 (FEDORA-EPEL-2018-8ff4cd58f7) Interactive process viewer -------------------------------------------------------------------------------- Update Information: update to 2.2.0 -------------------------------------------------------------------------------- ChangeLog: * Wed May 30 2018 Mukundan Ragavan <nonamedotc@xxxxxxxxxxxxxxxxx> - 2.2.0-1 - Update to 2.2.0 -------------------------------------------------------------------------------- ================================================================================ python-distroinfo-0.0.1-3.el7 (FEDORA-EPEL-2018-773e0f2a12) Parsing and querying distribution metadata stored in text/YAML files -------------------------------------------------------------------------------- Update Information: Initial package build. -------------------------------------------------------------------------------- References: [ 1 ] Bug #1582276 - Review Request: python-distroinfo - packaging metadata interface https://bugzilla.redhat.com/show_bug.cgi?id=1582276 -------------------------------------------------------------------------------- ================================================================================ rust-1.26.1-2.el7 (FEDORA-EPEL-2018-e7dc5e37a1) The Rust Programming Language -------------------------------------------------------------------------------- Update Information: New versions of Rust and related tools -- see the release notes for [1.26.1](https://blog.rust-lang.org/2018/05/29/Rust-1.26.1.html). -------------------------------------------------------------------------------- ChangeLog: * Tue May 29 2018 Josh Stone <jistone@xxxxxxxxxx> - 1.26.1-2 - Update to 1.26.1. -------------------------------------------------------------------------------- _______________________________________________ epel-devel mailing list -- epel-devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to epel-devel-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/epel-devel@xxxxxxxxxxxxxxxxxxxxxxx/message/7HKMPJZNT6MWFIMGU43HO7JR3UBM6BQN/