The following Fedora EPEL 6 Security updates need testing: Age URL 1 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-5f91ab971e wordpress-5.1.6-1.el6 The following builds have been pushed to Fedora EPEL 6 updates-testing php-horde-horde-5.2.23-1.el6 tcpreplay-4.3.3-1.el6 Details about builds: ================================================================================ php-horde-horde-5.2.23-1.el6 (FEDORA-EPEL-2020-e982b1bb7c) Horde Application Framework -------------------------------------------------------------------------------- Update Information: **horde 5.2.23** * [mjr] SECURITY: Fix javascript injection vulnerability in mobile login page. * [mjr] Fix broken cloud search in portal block. -------------------------------------------------------------------------------- ChangeLog: * Mon Jun 15 2020 Remi Collet <remi@xxxxxxxxxxxx> - 5.2.23-1 - update to 5.2.23 -------------------------------------------------------------------------------- ================================================================================ tcpreplay-4.3.3-1.el6 (FEDORA-EPEL-2020-be517af396) Replay captured network traffic -------------------------------------------------------------------------------- Update Information: This release contains bug fixes only (which includes security fixes): - Increase cache buffers size to accomodate VLAN edits (#594) - Correct L2 header length to correct IP header offset (#583) - Fix warnings from gcc version 10 (#580) - Heap Buffer Overflow in randomize_iparp (#579) - Use after free in get_ipv6_next (#578) - Heap Buffer Overflow in git_ipv6_next (#576) - Call pcap_freecode() on pcap_compile() (#572) - Increase max snaplen to 262144 (#571) - Fix divide by zero in fuzzing (#570) - Unique IP repeats at very high iteration counts (#566) - Fails to compile on FreeBSD amd64 13.0 (#558) - Heap Buffer Overflow in do_checksum (#556) (#577) - Attempt to correct corrupt pcap files, if possible (#557) - Fix GCC v10 warnings (#555) - Remove some duplicated SOURCES entries (#551) - Expand /dev/bpfX hard limit to fix macOS Mojave (#550) - Implement --loopdelay-ms when using --loop=0 (#546) - Heap overflow packet2tree and get_l2len (#530) -------------------------------------------------------------------------------- ChangeLog: * Mon Jun 15 2020 Bojan Smojver <bojan@rexursive com> - 4.3.3-1 - bump up to 4.3.3 - CVE-2020-12740 * Fri Jan 31 2020 Fedora Release Engineering <releng@xxxxxxxxxxxxxxxxx> - 4.3.2-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild * Sat Jul 27 2019 Fedora Release Engineering <releng@xxxxxxxxxxxxxxxxx> - 4.3.2-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild -------------------------------------------------------------------------------- References: [ 1 ] Bug #1678246 - CVE-2019-8377 tcpreplay: null pointer dereference in function get_ipv6_l4proto() in get.c [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=1678246 [ 2 ] Bug #1835343 - CVE-2020-12740 tcpreplay: Heap-based buffer over-read in function get_ipv6_next() at common/get.c [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1835343 -------------------------------------------------------------------------------- _______________________________________________ epel-devel mailing list -- epel-devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to epel-devel-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/epel-devel@xxxxxxxxxxxxxxxxxxxxxxx