Fedora EPEL 7 updates-testing report

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The following Fedora EPEL 7 Security updates need testing:
 Age  URL
   4  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-efd9bbf67e   golang-1.19.9-1.el7


The following builds have been pushed to Fedora EPEL 7 updates-testing

    distgen-1.16-1.el7
    qemu-2.0.0-5.el7

Details about builds:


================================================================================
 distgen-1.16-1.el7 (FEDORA-EPEL-2023-be47f2484b)
 Templating system/generator for distributions
--------------------------------------------------------------------------------
Update Information:

New upstream release of distgen.
--------------------------------------------------------------------------------
ChangeLog:

* Mon May 29 2023 Zuzana Miklankova <zmiklank@xxxxxxxxxx> - 1.16-1
- new upstream release, https://github.com/devexp-db/distgen/releases/tag/v1.16
--------------------------------------------------------------------------------


================================================================================
 qemu-2.0.0-5.el7 (FEDORA-EPEL-2023-03b316a546)
 QEMU is a FAST! processor emulator
--------------------------------------------------------------------------------
Update Information:

Backport fix for CVE-2015-7504.
--------------------------------------------------------------------------------
ChangeLog:

* Tue May 16 2023 Carl George <carl@george.computer> - 2:2.0.0-5
- CVE-2015-7504: pcnet: add check to validate receive data size (bz #1286547)
* Tue May 16 2023 Carl George <carl@george.computer> - 2:2.0.0-4
- Disable ppc64le-linux-user and qemu-system-ppc package
* Fri Feb  8 2019 Murilo Opsfelder Araujo <muriloo@xxxxxxxxxxxxx> - 2:2.0.0-3
- Enable ppc64le-linux-user
* Fri Feb  8 2019 Murilo Opsfelder Araujo <muriloo@xxxxxxxxxxxxx> - 2:2.0.0-2
- Enable qemu-system-ppc package
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1286547 - CVE-2015-7504 Qemu: net: pcnet: heap overflow vulnerability in pcnet_receive [epel-7]
        https://bugzilla.redhat.com/show_bug.cgi?id=1286547
--------------------------------------------------------------------------------

_______________________________________________
epel-devel mailing list -- epel-devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to epel-devel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/epel-devel@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue




[Index of Archives]     [Fedora Announce]     [Fedora News]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Maintainers]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [Fedora Fonts]     [ATA RAID]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Announce]     [SSH]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora QA]     [Fedora Triage]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Tux]     [Yosemite News]     [Linux Apps]     [Gnome Users]     [KDE Users]     [Fedora Tools]     [Fedora Art]     [Fedora Docs]     [Maemo Users]     [Asterisk PBX]     [Fedora Sparc]     [Fedora Universal Network Connector]     [Fedora ARM]

  Powered by Linux