The following Fedora 20 Security updates need testing: Age URL 53 https://admin.fedoraproject.org/updates/FEDORA-2014-11969/krb5-1.11.5-16.fc20 11 https://admin.fedoraproject.org/updates/FEDORA-2014-14791/mariadb-galera-5.5.40-2.fc20 10 https://admin.fedoraproject.org/updates/FEDORA-2014-15108/mantis-1.2.17-4.fc20 10 https://admin.fedoraproject.org/updates/FEDORA-2014-14963/avr-binutils-2.24-3.fc20 10 https://admin.fedoraproject.org/updates/FEDORA-2014-14833/arm-none-eabi-binutils-cs-2014.05.28-3.fc20 10 https://admin.fedoraproject.org/updates/FEDORA-2014-15130/kwebkitpart-1.3.4-5.fc20 7 https://admin.fedoraproject.org/updates/FEDORA-2014-15244/wireshark-1.10.11-1.fc20 7 https://admin.fedoraproject.org/updates/FEDORA-2014-15266/python-django14-1.4.16-1.fc20 5 https://admin.fedoraproject.org/updates/FEDORA-2014-15371/rubygem-actionpack-4.0.0-5.fc20 5 https://admin.fedoraproject.org/updates/FEDORA-2014-15393/lsyncd-2.1.4-4.fc20.1 5 https://admin.fedoraproject.org/updates/FEDORA-2014-15379/nodejs-0.10.33-1.fc20,libuv-0.10.29-1.fc20 5 https://admin.fedoraproject.org/updates/FEDORA-2014-15394/erlang-R16B-03.9.fc20 4 https://admin.fedoraproject.org/updates/FEDORA-2014-15464/python-eyed3-0.7.4-4.fc20 4 https://admin.fedoraproject.org/updates/FEDORA-2014-15489/rubygem-sprockets-2.8.2-5.fc20 3 https://admin.fedoraproject.org/updates/FEDORA-2014-15521/xen-4.3.3-5.fc20 3 https://admin.fedoraproject.org/updates/FEDORA-2014-15519/drupal6-6.34-1.fc20 3 https://admin.fedoraproject.org/updates/FEDORA-2014-15528/drupal7-7.34-1.fc20 3 https://admin.fedoraproject.org/updates/FEDORA-2014-15538/phpMyAdmin-4.2.12-1.fc20 3 https://admin.fedoraproject.org/updates/FEDORA-2014-15507/wordpress-4.0.1-1.fc20 0 https://admin.fedoraproject.org/updates/FEDORA-2014-15701/teeworlds-0.6.3-1.fc20 0 https://admin.fedoraproject.org/updates/FEDORA-2014-15706/curl-7.32.0-16.fc20 0 https://admin.fedoraproject.org/updates/FEDORA-2014-15709/asterisk-11.14.1-1.fc20 The following Fedora 20 Critical Path updates have yet to be approved: Age URL 11 https://admin.fedoraproject.org/updates/FEDORA-2014-15054/perl-Pod-Usage-1.64-2.fc20,perl-Pod-Checker-1.60-292.fc20 11 https://admin.fedoraproject.org/updates/FEDORA-2014-14798/device-mapper-persistent-data-0.4.1-2.fc20 11 https://admin.fedoraproject.org/updates/FEDORA-2014-14861/libpipeline-1.2.4-3.fc20 10 https://admin.fedoraproject.org/updates/FEDORA-2014-15120/dosfstools-3.0.27-1.fc20 7 https://admin.fedoraproject.org/updates/FEDORA-2014-15326/pycairo-1.10.0-1.fc20 3 https://admin.fedoraproject.org/updates/FEDORA-2014-15552/selinux-policy-3.12.1-195.fc20 3 https://admin.fedoraproject.org/updates/FEDORA-2014-15523/gdb-7.7.1-22.fc20 0 https://admin.fedoraproject.org/updates/FEDORA-2014-15706/curl-7.32.0-16.fc20 0 https://admin.fedoraproject.org/updates/FEDORA-2014-15722/v4l-utils-1.6.2-1.fc20 The following builds have been pushed to Fedora 20 updates-testing Cython-0.21.1-1.fc20 amanda-3.3.6-3.fc20 asterisk-11.14.1-1.fc20 backupninja-1.0.1-5.fc20 bvi-1.4.0-1.fc20 curl-7.32.0-16.fc20 easytag-2.2.5-1.fc20 fedora-packager-0.5.10.5-1.fc20 fedora-upgrade-21.3-1.fc20 flannel-0.1.0-7.git071d778.fc20 geary-0.6.5-1.fc20 golang-googlecode-go-exp-0-0.3.hgbd8df7009305.fc20 golang-googlecode-net-0-0.17.hg90e232e2462d.fc20 golang-googlecode-text-0-0.2.hg024681b033be.fc20 gsi-openssh-6.4p1-5.fc20 hamster-time-tracker-1.04-4.fc20 ibus-table-others-1.3.6-1.fc20 kde-connect-0.7.3-1.fc20 kernel-3.17.4-200.fc20 lua-ldoc-1.4.3-1.fc20 nodejs-events-1.0.2-1.fc20 nodejs-mustache-0.8.2-1.fc20 nodejs-wrappy-1.0.1-1.fc20 owncloud-7.0.3-2.fc20 perl-String-Errf-0.007-1.fc20 php-horde-Horde-Core-2.17.0-1.fc20 php-horde-Horde-Imap-Client-2.25.4-1.fc20 php-horde-Horde-ListHeaders-1.2.0-1.fc20 php-horde-Horde-Mail-2.5.0-1.fc20 php-horde-Horde-Mime-2.5.1-1.fc20 php-horde-Horde-Smtp-1.7.0-1.fc20 php-horde-nag-4.2.3-1.fc20 php-opencloud-1.11.0-3.fc20 python-flask-rstpages-0.3-3.fc20 python-husl-4.0.1-1.fc20 python-rhsm-1.13.8-1.fc20 python-watchdog-0.8.2-1.fc20 skf-1.99.10-1.fc20 subscription-manager-1.13.9-1.fc20 teeworlds-0.6.3-1.fc20 v4l-utils-1.6.2-1.fc20 xca-1.1.0-1.fc20 ykpers-1.16.1-1.fc20 Details about builds: ================================================================================ Cython-0.21.1-1.fc20 (FEDORA-2014-15734) A language for writing Python extension modules -------------------------------------------------------------------------------- Update Information: see: https://github.com/cython/cython/blob/master/CHANGES.rst -b 1165297 see: https://github.com/cython/cython/blob/master/CHANGES.rst -------------------------------------------------------------------------------- ChangeLog: * Sat Nov 22 2014 nbecker <ndbecker2@xxxxxxxxx> - 0.21.1-1 - Update to 0.21.1 (br #1164297) * Mon Sep 15 2014 nbecker <ndbecker2@xxxxxxxxx> - 0.21-5 - Add /bin/cythonize * Mon Sep 15 2014 nbecker <ndbecker2@xxxxxxxxx> - 0.21-1 - Update to 0.21 * Fri Aug 15 2014 Fedora Release Engineering <rel-eng@xxxxxxxxxxxxxxxxxxxxxxx> - 0.20.1-5 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild * Fri Jun 6 2014 Fedora Release Engineering <rel-eng@xxxxxxxxxxxxxxxxxxxxxxx> - 0.20.1-4 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild * Wed May 28 2014 Thomas Spura <tomspur@xxxxxxxxxxxxxxxxx> - 0.20.1-3 - Rebuilt for https://fedoraproject.org/wiki/Changes/Python_3.4 * Fri May 9 2014 Orion Poplawski <orion@xxxxxxxxxxxxx> - 0.20.1-2 - Rebuild for Python 3.4 * Fri May 9 2014 Orion Poplawski <orion@xxxxxxxxxxxxx> - 0.20.1-1 - Update to 0.20.1 -------------------------------------------------------------------------------- ================================================================================ amanda-3.3.6-3.fc20 (FEDORA-2014-15726) A network-capable tape backup solution -------------------------------------------------------------------------------- Update Information: add kamanda systemd unit files (#1077642) -------------------------------------------------------------------------------- ChangeLog: * Mon Nov 24 2014 Petr Hracek <phracek@xxxxxxxxxx> - 3.3.6-3 - add kamanda systemd unit files (#1077642) -------------------------------------------------------------------------------- References: [ 1 ] Bug #1077642 - [PATCH] add kamanda systemd unit files. https://bugzilla.redhat.com/show_bug.cgi?id=1077642 -------------------------------------------------------------------------------- ================================================================================ asterisk-11.14.1-1.fc20 (FEDORA-2014-15709) The Open Source PBX -------------------------------------------------------------------------------- Update Information: * Fri Nov 21 2014 Jeffrey C. Ollie <jeff@xxxxxxxxxx> - 11.14.1-1 - The Asterisk Development Team has announced security releases for Certified - Asterisk 1.8.28 and 11.6 and Asterisk 1.8, 11, 12, and 13. The available - security releases are released as versions 1.8.28-cert3, 11.6-cert8, 1.8.32.1, - 11.14.1, 12.7.1, and 13.0.1. - - These releases are available for immediate download at - http://downloads.asterisk.org/pub/telephony/asterisk/releases - - The release of these versions resolves the following security vulnerabilities: - - * AST-2014-012: Unauthorized access in the presence of ACLs with mixed IP - address families - - Many modules in Asterisk that service incoming IP traffic have ACL options - ("permit" and "deny") that can be used to whitelist or blacklist address - ranges. A bug has been discovered where the address family of incoming - packets is only compared to the IP address family of the first entry in the - list of access control rules. If the source IP address for an incoming - packet is not of the same address as the first ACL entry, that packet - bypasses all ACL rules. - - * AST-2014-018: Permission Escalation through DB dialplan function - - The DB dialplan function when executed from an external protocol, such as AMI, - could result in a privilege escalation. Users with a lower class authorization - in AMI can access the internal Asterisk database without the required SYSTEM - class authorization. - - In addition, the release of 11.6-cert8 and 11.14.1 resolves the following - security vulnerability: - - * AST-2014-014: High call load with ConfBridge can result in resource exhaustion - - The ConfBridge application uses an internal bridging API to implement - conference bridges. This internal API uses a state model for channels within - the conference bridge and transitions between states as different things - occur. Unload load it is possible for some state transitions to be delayed - causing the channel to transition from being hung up to waiting for media. As - the channel has been hung up remotely no further media will arrive and the - channel will stay within ConfBridge indefinitely. - - In addition, the release of 11.6-cert8, 11.14.1, 12.7.1, and 13.0.1 resolves - the following security vulnerability: - - * AST-2014-017: Permission Escalation via ConfBridge dialplan function and - AMI ConfbridgeStartRecord Action - - The CONFBRIDGE dialplan function when executed from an external protocol (such - as AMI) can result in a privilege escalation as certain options within that - function can affect the underlying system. Additionally, the AMI - ConfbridgeStartRecord action has options that would allow modification of the - underlying system, and does not require SYSTEM class authorization in AMI. - - Finally, the release of 12.7.1 and 13.0.1 resolves the following security - vulnerabilities: - - * AST-2014-013: Unauthorized access in the presence of ACLs in the PJSIP stack - - The Asterisk module res_pjsip provides the ability to configure ACLs that may - be used to reject SIP requests from various hosts. However, the module - currently fails to create and apply the ACLs defined in its configuration - file on initial module load. - - * AST-2014-015: Remote crash vulnerability in PJSIP channel driver - - The chan_pjsip channel driver uses a queue approach for relating to SIP - sessions. There exists a race condition where actions may be queued to answer - a session or send ringing after a SIP session has been terminated using a - CANCEL request. The code will incorrectly assume that the SIP session is still - active and attempt to send the SIP response. The PJSIP library does not - expect the SIP session to be in the disconnected state when sending the - response and asserts. - - * AST-2014-016: Remote crash vulnerability in PJSIP channel driver - - When handling an INVITE with Replaces message the res_pjsip_refer module - incorrectly assumes that it will be operating on a channel that has just been - created. If the INVITE with Replaces message is sent in-dialog after a session - has been established this assumption will be incorrect. The res_pjsip_refer - module will then hang up a channel that is actually owned by another thread. - When this other thread attempts to use the just hung up channel it will end up - using a freed channel which will likely result in a crash. - - For more information about the details of these vulnerabilities, please read - security advisories AST-2014-012, AST-2014-013, AST-2014-014, AST-2014-015, - AST-2014-016, AST-2014-017, and AST-2014-018, which were released at the same - time as this announcement. - - For a full list of changes in the current releases, please see the ChangeLogs: - - http://downloads.asterisk.org/pub/telephony/certified-asterisk/releases/ChangeLog-1.8.28-cert3 - http://downloads.asterisk.org/pub/telephony/certified-asterisk/releases/ChangeLog-11.6-cert8 - http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.32.1 - http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.14.1 - http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-12.7.1 - http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-13.0.1 - - The security advisories are available at: - - * http://downloads.asterisk.org/pub/security/AST-2014-012.pdf - * http://downloads.asterisk.org/pub/security/AST-2014-013.pdf - * http://downloads.asterisk.org/pub/security/AST-2014-014.pdf - * http://downloads.asterisk.org/pub/security/AST-2014-015.pdf - * http://downloads.asterisk.org/pub/security/AST-2014-016.pdf - * http://downloads.asterisk.org/pub/security/AST-2014-017.pdf - * http://downloads.asterisk.org/pub/security/AST-2014-018.pdf * Fri Nov 21 2014 Jeffrey C. Ollie <jeff@xxxxxxxxxx> - 11.14.0-1 - The Asterisk Development Team has announced the release of Asterisk 11.14.0. - This release is available for immediate download at - http://downloads.asterisk.org/pub/telephony/asterisk - - The release of Asterisk 11.14.0 resolves several issues reported by the - community and would have not been possible without your participation. - Thank you! - - The following are the issues resolved in this release: - - Bugs fixed in this release: - ----------------------------------- - * ASTERISK-24348 - Built-in editline tab complete segfault with - MALLOC_DEBUG (Reported by Walter Doekes) - * ASTERISK-24335 - [PATCH] Asterisk incorrectly responds 503 to - INVITE retransmissions of rejected calls (Reported by Torrey - Searle) - * ASTERISK-23768 - [patch] Asterisk man page contains a (new) - unquoted minus sign (Reported by Jeremy Lainé) - * ASTERISK-24357 - [fax] Out of bounds error in update_modem_bits - (Reported by Jeremy Lainé) - * ASTERISK-20567 - bashism in autosupport (Reported by Tzafrir - Cohen) - * ASTERISK-22945 - [patch] Memory leaks in chan_sip.c with - realtime peers (Reported by ibercom) - * ASTERISK-24384 - chan_motif: format capabilities leak on module - load error (Reported by Corey Farrell) - * ASTERISK-24385 - chan_sip: process_sdp leaks on an error path - (Reported by Corey Farrell) - * ASTERISK-24378 - Release AMI connections on shutdown (Reported - by Corey Farrell) - * ASTERISK-24354 - AMI sendMessage closes AMI connection on error - (Reported by Peter Katzmann) - * ASTERISK-24390 - astobj2: REF_DEBUG reports false leaks with - ao2_callback with OBJ_MULTIPLE (Reported by Corey Farrell) - * ASTERISK-24326 - res_rtp_asterisk: ICE-TCP candidates are - incorrectly attempted (Reported by Joshua Colp) - * ASTERISK-24011 - [patch]safe_asterisk tries to set ulimit -n too - high on linux systems with lots of RAM (Reported by Michael - Myles) - * ASTERISK-24383 - res_rtp_asterisk: Crash if no candidates - received for component (Reported by Kevin Harwell) - * ASTERISK-20784 - Failure to receive an ACK to a SIP Re-INVITE - results in a SIP channel leak (Reported by NITESH BANSAL) - * ASTERISK-15879 - [patch] Failure to receive an ACK to a SIP - Re-INVITE results in a SIP channel leak (Reported by Torrey - Searle) - * ASTERISK-24406 - Some caller ID strings are parsed differently - since 11.13.0 (Reported by Etienne Lessard) - * ASTERISK-24325 - res_calendar_ews: cannot be used with neon 0.30 - (Reported by Tzafrir Cohen) - * ASTERISK-13797 - [patch] relax badshell tilde test (Reported by - Tzafrir Cohen) - * ASTERISK-22791 - asterisk sends Re-INVITE after receiving a BYE - (Reported by Paolo Compagnini) - * ASTERISK-18923 - res_fax_spandsp usage counter is wrong - (Reported by Grigoriy Puzankin) - * ASTERISK-24392 - res_fax: fax gateway sessions leak (Reported by - Corey Farrell) - * ASTERISK-24393 - rtptimeout=0 doesn't disable rtptimeout - (Reported by Dmitry Melekhov) - * ASTERISK-23846 - Unistim multilines. Loss of voice after second - call drops (on a second line). (Reported by Rustam Khankishyiev) - * ASTERISK-24063 - [patch]Asterisk does not respect outbound proxy - when sending qualify requests (Reported by Damian Ivereigh) - * ASTERISK-24425 - [patch] jabber/xmpp to use TLS instead of - SSLv3, security fix POODLE (CVE-2014-3566) (Reported by - abelbeck) - * ASTERISK-24436 - Missing header in res/res_srtp.c when compiling - against libsrtp-1.5.0 (Reported by Patrick Laimbock) - * ASTERISK-24454 - app_queue: ao2_iterator not destroyed, causing - leak (Reported by Corey Farrell) - * ASTERISK-24430 - missing letter "p" in word response in - OriginateResponse event documentation (Reported by Dafi Ni) - * ASTERISK-24457 - res_fax: fax gateway frames leak (Reported by - Corey Farrell) - * ASTERISK-21721 - SIP Failed to parse multiple Supported: headers - (Reported by Olle Johansson) - * ASTERISK-24304 - asterisk crashing randomly because of unistim - channel (Reported by dhanapathy sathya) - * ASTERISK-24190 - IMAP voicemail causes segfault (Reported by - Nick Adams) - * ASTERISK-24466 - app_queue: fix a couple leaks to struct - call_queue (Reported by Corey Farrell) - * ASTERISK-24432 - Install refcounter.py when REF_DEBUG is enabled - (Reported by Corey Farrell) - * ASTERISK-24476 - main/app.c / app_voicemail: ast_writestream - leaks (Reported by Corey Farrell) - * ASTERISK-24307 - Unintentional memory retention in stringfields - (Reported by Etienne Lessard) - - For a full list of changes in this release, please see the ChangeLog: - - http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.14.0 -------------------------------------------------------------------------------- ChangeLog: * Fri Nov 21 2014 Jeffrey C. Ollie <jeff@xxxxxxxxxx> - 11.14.1-1 - The Asterisk Development Team has announced security releases for Certified - Asterisk 1.8.28 and 11.6 and Asterisk 1.8, 11, 12, and 13. The available - security releases are released as versions 1.8.28-cert3, 11.6-cert8, 1.8.32.1, - 11.14.1, 12.7.1, and 13.0.1. - - These releases are available for immediate download at - http://downloads.asterisk.org/pub/telephony/asterisk/releases - - The release of these versions resolves the following security vulnerabilities: - - * AST-2014-012: Unauthorized access in the presence of ACLs with mixed IP - address families - - Many modules in Asterisk that service incoming IP traffic have ACL options - ("permit" and "deny") that can be used to whitelist or blacklist address - ranges. A bug has been discovered where the address family of incoming - packets is only compared to the IP address family of the first entry in the - list of access control rules. If the source IP address for an incoming - packet is not of the same address as the first ACL entry, that packet - bypasses all ACL rules. - - * AST-2014-018: Permission Escalation through DB dialplan function - - The DB dialplan function when executed from an external protocol, such as AMI, - could result in a privilege escalation. Users with a lower class authorization - in AMI can access the internal Asterisk database without the required SYSTEM - class authorization. - - In addition, the release of 11.6-cert8 and 11.14.1 resolves the following - security vulnerability: - - * AST-2014-014: High call load with ConfBridge can result in resource exhaustion - - The ConfBridge application uses an internal bridging API to implement - conference bridges. This internal API uses a state model for channels within - the conference bridge and transitions between states as different things - occur. Unload load it is possible for some state transitions to be delayed - causing the channel to transition from being hung up to waiting for media. As - the channel has been hung up remotely no further media will arrive and the - channel will stay within ConfBridge indefinitely. - - In addition, the release of 11.6-cert8, 11.14.1, 12.7.1, and 13.0.1 resolves - the following security vulnerability: - - * AST-2014-017: Permission Escalation via ConfBridge dialplan function and - AMI ConfbridgeStartRecord Action - - The CONFBRIDGE dialplan function when executed from an external protocol (such - as AMI) can result in a privilege escalation as certain options within that - function can affect the underlying system. Additionally, the AMI - ConfbridgeStartRecord action has options that would allow modification of the - underlying system, and does not require SYSTEM class authorization in AMI. - - Finally, the release of 12.7.1 and 13.0.1 resolves the following security - vulnerabilities: - - * AST-2014-013: Unauthorized access in the presence of ACLs in the PJSIP stack - - The Asterisk module res_pjsip provides the ability to configure ACLs that may - be used to reject SIP requests from various hosts. However, the module - currently fails to create and apply the ACLs defined in its configuration - file on initial module load. - - * AST-2014-015: Remote crash vulnerability in PJSIP channel driver - - The chan_pjsip channel driver uses a queue approach for relating to SIP - sessions. There exists a race condition where actions may be queued to answer - a session or send ringing after a SIP session has been terminated using a - CANCEL request. The code will incorrectly assume that the SIP session is still - active and attempt to send the SIP response. The PJSIP library does not - expect the SIP session to be in the disconnected state when sending the - response and asserts. - - * AST-2014-016: Remote crash vulnerability in PJSIP channel driver - - When handling an INVITE with Replaces message the res_pjsip_refer module - incorrectly assumes that it will be operating on a channel that has just been - created. If the INVITE with Replaces message is sent in-dialog after a session - has been established this assumption will be incorrect. The res_pjsip_refer - module will then hang up a channel that is actually owned by another thread. - When this other thread attempts to use the just hung up channel it will end up - using a freed channel which will likely result in a crash. - - For more information about the details of these vulnerabilities, please read - security advisories AST-2014-012, AST-2014-013, AST-2014-014, AST-2014-015, - AST-2014-016, AST-2014-017, and AST-2014-018, which were released at the same - time as this announcement. - - For a full list of changes in the current releases, please see the ChangeLogs: - - http://downloads.asterisk.org/pub/telephony/certified-asterisk/releases/ChangeLog-1.8.28-cert3 - http://downloads.asterisk.org/pub/telephony/certified-asterisk/releases/ChangeLog-11.6-cert8 - http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.32.1 - http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.14.1 - http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-12.7.1 - http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-13.0.1 - - The security advisories are available at: - - * http://downloads.asterisk.org/pub/security/AST-2014-012.pdf - * http://downloads.asterisk.org/pub/security/AST-2014-013.pdf - * http://downloads.asterisk.org/pub/security/AST-2014-014.pdf - * http://downloads.asterisk.org/pub/security/AST-2014-015.pdf - * http://downloads.asterisk.org/pub/security/AST-2014-016.pdf - * http://downloads.asterisk.org/pub/security/AST-2014-017.pdf - * http://downloads.asterisk.org/pub/security/AST-2014-018.pdf * Fri Nov 21 2014 Jeffrey C. Ollie <jeff@xxxxxxxxxx> - 11.14.0-1 - The Asterisk Development Team has announced the release of Asterisk 11.14.0. - This release is available for immediate download at - http://downloads.asterisk.org/pub/telephony/asterisk - - The release of Asterisk 11.14.0 resolves several issues reported by the - community and would have not been possible without your participation. - Thank you! - - The following are the issues resolved in this release: - - Bugs fixed in this release: - ----------------------------------- - * ASTERISK-24348 - Built-in editline tab complete segfault with - MALLOC_DEBUG (Reported by Walter Doekes) - * ASTERISK-24335 - [PATCH] Asterisk incorrectly responds 503 to - INVITE retransmissions of rejected calls (Reported by Torrey - Searle) - * ASTERISK-23768 - [patch] Asterisk man page contains a (new) - unquoted minus sign (Reported by Jeremy Lainé) - * ASTERISK-24357 - [fax] Out of bounds error in update_modem_bits - (Reported by Jeremy Lainé) - * ASTERISK-20567 - bashism in autosupport (Reported by Tzafrir - Cohen) - * ASTERISK-22945 - [patch] Memory leaks in chan_sip.c with - realtime peers (Reported by ibercom) - * ASTERISK-24384 - chan_motif: format capabilities leak on module - load error (Reported by Corey Farrell) - * ASTERISK-24385 - chan_sip: process_sdp leaks on an error path - (Reported by Corey Farrell) - * ASTERISK-24378 - Release AMI connections on shutdown (Reported - by Corey Farrell) - * ASTERISK-24354 - AMI sendMessage closes AMI connection on error - (Reported by Peter Katzmann) - * ASTERISK-24390 - astobj2: REF_DEBUG reports false leaks with - ao2_callback with OBJ_MULTIPLE (Reported by Corey Farrell) - * ASTERISK-24326 - res_rtp_asterisk: ICE-TCP candidates are - incorrectly attempted (Reported by Joshua Colp) - * ASTERISK-24011 - [patch]safe_asterisk tries to set ulimit -n too - high on linux systems with lots of RAM (Reported by Michael - Myles) - * ASTERISK-24383 - res_rtp_asterisk: Crash if no candidates - received for component (Reported by Kevin Harwell) - * ASTERISK-20784 - Failure to receive an ACK to a SIP Re-INVITE - results in a SIP channel leak (Reported by NITESH BANSAL) - * ASTERISK-15879 - [patch] Failure to receive an ACK to a SIP - Re-INVITE results in a SIP channel leak (Reported by Torrey - Searle) - * ASTERISK-24406 - Some caller ID strings are parsed differently - since 11.13.0 (Reported by Etienne Lessard) - * ASTERISK-24325 - res_calendar_ews: cannot be used with neon 0.30 - (Reported by Tzafrir Cohen) - * ASTERISK-13797 - [patch] relax badshell tilde test (Reported by - Tzafrir Cohen) - * ASTERISK-22791 - asterisk sends Re-INVITE after receiving a BYE - (Reported by Paolo Compagnini) - * ASTERISK-18923 - res_fax_spandsp usage counter is wrong - (Reported by Grigoriy Puzankin) - * ASTERISK-24392 - res_fax: fax gateway sessions leak (Reported by - Corey Farrell) - * ASTERISK-24393 - rtptimeout=0 doesn't disable rtptimeout - (Reported by Dmitry Melekhov) - * ASTERISK-23846 - Unistim multilines. Loss of voice after second - call drops (on a second line). (Reported by Rustam Khankishyiev) - * ASTERISK-24063 - [patch]Asterisk does not respect outbound proxy - when sending qualify requests (Reported by Damian Ivereigh) - * ASTERISK-24425 - [patch] jabber/xmpp to use TLS instead of - SSLv3, security fix POODLE (CVE-2014-3566) (Reported by - abelbeck) - * ASTERISK-24436 - Missing header in res/res_srtp.c when compiling - against libsrtp-1.5.0 (Reported by Patrick Laimbock) - * ASTERISK-24454 - app_queue: ao2_iterator not destroyed, causing - leak (Reported by Corey Farrell) - * ASTERISK-24430 - missing letter "p" in word response in - OriginateResponse event documentation (Reported by Dafi Ni) - * ASTERISK-24457 - res_fax: fax gateway frames leak (Reported by - Corey Farrell) - * ASTERISK-21721 - SIP Failed to parse multiple Supported: headers - (Reported by Olle Johansson) - * ASTERISK-24304 - asterisk crashing randomly because of unistim - channel (Reported by dhanapathy sathya) - * ASTERISK-24190 - IMAP voicemail causes segfault (Reported by - Nick Adams) - * ASTERISK-24466 - app_queue: fix a couple leaks to struct - call_queue (Reported by Corey Farrell) - * ASTERISK-24432 - Install refcounter.py when REF_DEBUG is enabled - (Reported by Corey Farrell) - * ASTERISK-24476 - main/app.c / app_voicemail: ast_writestream - leaks (Reported by Corey Farrell) - * ASTERISK-24307 - Unintentional memory retention in stringfields - (Reported by Etienne Lessard) - - For a full list of changes in this release, please see the ChangeLog: - - http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.14.0 -------------------------------------------------------------------------------- References: [ 1 ] Bug #1166692 - asterisk: AMI permission escalation through DB dialplan function [AST-2014-018] [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1166692 [ 2 ] Bug #1166690 - asterisk: Permission escalation through ConfBridge actions/dialplan functions [AST-2014-017] [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1166690 [ 3 ] Bug #1166684 - asterisk: High call load may result in hung channels in ConfBridge [AST-2014-014] [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1166684 [ 4 ] Bug #1166676 - asterisk: Mixed IP address families in access control lists may permit unwanted traffic [AST-2014-012] [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1166676 -------------------------------------------------------------------------------- ================================================================================ backupninja-1.0.1-5.fc20 (FEDORA-2014-15745) Lightweight, extensible backup system -------------------------------------------------------------------------------- Update Information: backupninja: added patch for RH-system specific -------------------------------------------------------------------------------- ChangeLog: * Fri Nov 21 2014 Denis Fateyev <denis@xxxxxxxxxxx> - 1.0.1-5 - Added patch for RH-system specific -------------------------------------------------------------------------------- References: [ 1 ] Bug #1155010 - References to apt-get and dpkg still present in build https://bugzilla.redhat.com/show_bug.cgi?id=1155010 -------------------------------------------------------------------------------- ================================================================================ bvi-1.4.0-1.fc20 (FEDORA-2014-15716) Display-oriented editor for binary files -------------------------------------------------------------------------------- Update Information: Update to stable release -------------------------------------------------------------------------------- ChangeLog: * Mon Nov 24 2014 Matthieu Saulnier <fantom@xxxxxxxxxxxxxxxxx> - 1.4.0-1 - Update to 1.4.0 stable release * Fri Aug 15 2014 Fedora Release Engineering <rel-eng@xxxxxxxxxxxxxxxxxxxxxxx> - 1.4.0beta-0.3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild * Sat Jun 7 2014 Fedora Release Engineering <rel-eng@xxxxxxxxxxxxxxxxxxxxxxx> - 1.4.0beta-0.2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild * Thu Dec 26 2013 Matthieu Saulnier <fantom@xxxxxxxxxxxxxxxxx> - 1.4.0beta-0.1 - Update to 1.4.0beta - Remove patch to move help file (upstream issue) - Remove patch to fix empty debuginfo package (upstream issue) - Fix FTBFS if "-Werror=format-security" flag is used (RHBZ#1037006) (upstream issue) - Fix bogus date in %changelog section -------------------------------------------------------------------------------- References: [ 1 ] Bug #1062170 - bvi-1.4.0rc2 is available https://bugzilla.redhat.com/show_bug.cgi?id=1062170 -------------------------------------------------------------------------------- ================================================================================ curl-7.32.0-16.fc20 (FEDORA-2014-15706) A utility for getting files from remote servers (FTP, HTTP, and others) -------------------------------------------------------------------------------- Update Information: - allow to use TLS 1.1 and TLS 1.2 (#1153814) - disable libcurl-level downgrade to SSLv3 (#1166567) - low-speed-limit: avoid timeout flood (#1166239) - fix handling of CURLOPT_COPYPOSTFIELDS in curl_easy_duphandle (CVE-2014-3707) -------------------------------------------------------------------------------- ChangeLog: * Mon Nov 24 2014 Kamil Dudka <kdudka@xxxxxxxxxx> 7.32.0-16 - allow to use TLS 1.1 and TLS 1.2 (#1153814) - disable libcurl-level downgrade to SSLv3 (#1166567) - low-speed-limit: avoid timeout flood (#1166239) -------------------------------------------------------------------------------- References: [ 1 ] Bug #1154941 - CVE-2014-3707 curl: incorrect handle duplication after COPYPOSTFIELDS https://bugzilla.redhat.com/show_bug.cgi?id=1154941 -------------------------------------------------------------------------------- ================================================================================ easytag-2.2.5-1.fc20 (FEDORA-2014-15713) Tag editor for MP3, Ogg, FLAC and other music files -------------------------------------------------------------------------------- Update Information: Update to 2.2.5 * Fix many memory leaks in the CDDB search dialog * Clear empty cover art and album artist fields in MP4 tags * Fix a memory leak and invalid read in the MP4 tagging code * Improve ID3v2 handling with Ogg files * Improve file list selection handling * Fix several memory leaks in the file browser * Åka Sikrom’s Norwegian bokmål translation -------------------------------------------------------------------------------- ChangeLog: * Mon Nov 24 2014 David King <amigadave@xxxxxxxxxxxxx> 2.2.5-1 - Update to 2.2.5 -------------------------------------------------------------------------------- ================================================================================ fedora-packager-0.5.10.5-1.fc20 (FEDORA-2014-15708) Tools for setting up a fedora maintainer environment -------------------------------------------------------------------------------- Update Information: remove fedora-cvs script as the cvs server no longer exists (dennis) Make fas url configurable for fedora-server-ca.cert. (rbean) Remove unused imports. (rbean) Remove another unused import. (rbean) Conditionalize CRL checking for el6. (rbean) Remove unused imports. (rbean) Add CRL checking to fedora-cert. (rbean) fedoradev-pkgowners: Update pkgdb URL (opensource) -------------------------------------------------------------------------------- ChangeLog: * Mon Nov 24 2014 Dennis Gilmore <dennis@xxxxxxxx> - 0.5.10.5-1 - remove fedora-cvs script as the cvs server no longer exists (dennis) - Make fas url configurable for fedora-server-ca.cert. (rbean) - Remove unused imports. (rbean) - Remove another unused import. (rbean) - Conditionalize CRL checking for el6. (rbean) - Remove unused imports. (rbean) - Add CRL checking to fedora-cert. (rbean) - fedoradev-pkgowners: Update pkgdb URL (opensource) * Sat Jun 7 2014 Fedora Release Engineering <rel-eng@xxxxxxxxxxxxxxxxxxxxxxx> - 0.5.10.4-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild * Sun Mar 23 2014 Nick Bebout <nb@xxxxxxxxxxxxxxxxx> - 0.5.10.4-1 - fix fedora-burn-yubikey script to add -oserial-api-visible -------------------------------------------------------------------------------- ================================================================================ fedora-upgrade-21.3-1.fc20 (FEDORA-2014-15736) Upgrade Fedora to next version using yum upgrade (unofficial tool) -------------------------------------------------------------------------------- Update Information: fedora-release-standard was renamed to fedora-release-nonproduct -------------------------------------------------------------------------------- ChangeLog: * Mon Nov 24 2014 Miroslav Suchý <miroslav@xxxxxxxx> 21.3-1 - 1167079 - fedora-release-standard was renamed to fedora-release-nonproduct - sync upgrade to rawhide with wiki page -------------------------------------------------------------------------------- References: [ 1 ] Bug #1167079 - problems upgrading F20 to F21 https://bugzilla.redhat.com/show_bug.cgi?id=1167079 -------------------------------------------------------------------------------- ================================================================================ flannel-0.1.0-7.git071d778.fc20 (FEDORA-2014-15699) Etcd address management agent for overlay networks -------------------------------------------------------------------------------- Update Information: new golang package -------------------------------------------------------------------------------- References: [ 1 ] Bug #1165688 - Review Request: flannel - Flannel is an etcd backed network fabric for containers https://bugzilla.redhat.com/show_bug.cgi?id=1165688 -------------------------------------------------------------------------------- ================================================================================ geary-0.6.5-1.fc20 (FEDORA-2014-15702) A lightweight email program designed around conversations -------------------------------------------------------------------------------- Update Information: Update to Geary 0.6.5: * Fixed help documentation installation of translated pages Update to Geary 0.6.4: * French documentation added * Updated translations -------------------------------------------------------------------------------- ChangeLog: * Sun Nov 23 2014 Thomas Moschny <thomas.moschny@xxxxxx> - 0.6.5-1 - Update to 0.6.5. -------------------------------------------------------------------------------- ================================================================================ golang-googlecode-go-exp-0-0.3.hgbd8df7009305.fc20 (FEDORA-2014-15693) Experimental tools and packages for Go -------------------------------------------------------------------------------- Update Information: Extend import paths for golang.org/x/ -------------------------------------------------------------------------------- ChangeLog: * Fri Nov 21 2014 jchaloup <jchaloup@xxxxxxxxxx> - 0-0.3.hgbd8df7009305 - Extend import paths for golang.org/x/ related: #1148481 -------------------------------------------------------------------------------- References: [ 1 ] Bug #1148481 - Review Request: golang-googlecode-go-exp - Experimental tools and packages for Go https://bugzilla.redhat.com/show_bug.cgi?id=1148481 -------------------------------------------------------------------------------- ================================================================================ golang-googlecode-net-0-0.17.hg90e232e2462d.fc20 (FEDORA-2014-15735) Supplementary Go networking libraries -------------------------------------------------------------------------------- Update Information: Extend import paths for golang.org/x/ -------------------------------------------------------------------------------- ChangeLog: * Mon Nov 24 2014 jchaloup <jchaloup@xxxxxxxxxx> - 0-0.17.hg90e232e2462d - Extend import paths for golang.org/x/ related: #1009967 -------------------------------------------------------------------------------- References: [ 1 ] Bug #1009967 - Review Request: golang-googlecode-net - Supplementary Go networking libraries https://bugzilla.redhat.com/show_bug.cgi?id=1009967 -------------------------------------------------------------------------------- ================================================================================ golang-googlecode-text-0-0.2.hg024681b033be.fc20 (FEDORA-2014-15719) Supplementary Go text libraries -------------------------------------------------------------------------------- Update Information: Extend import paths for golang.org/x/ -------------------------------------------------------------------------------- ChangeLog: * Fri Nov 21 2014 jchaloup <jchaloup@xxxxxxxxxx> - 0-0.2.hg024681b033be - Extend import paths for golang.org/x/ - Choose the correct architecture related: #1056285 -------------------------------------------------------------------------------- References: [ 1 ] Bug #1056285 - Review Request: golang-googlecode-text - Supplementary Go text libraries https://bugzilla.redhat.com/show_bug.cgi?id=1056285 -------------------------------------------------------------------------------- ================================================================================ gsi-openssh-6.4p1-5.fc20 (FEDORA-2014-15739) An implementation of the SSH protocol with GSI authentication -------------------------------------------------------------------------------- Update Information: Synch with latest openssh package. -------------------------------------------------------------------------------- ChangeLog: * Mon Nov 24 2014 Mattias Ellert <mattias.ellert@xxxxxxxxxxxx> - 6.4p1-5 - Based on openssh-6.4p1-6.fc20 -------------------------------------------------------------------------------- ================================================================================ hamster-time-tracker-1.04-4.fc20 (FEDORA-2014-15698) The Linux time tracker -------------------------------------------------------------------------------- Update Information: Bugfix! -------------------------------------------------------------------------------- ChangeLog: * Sun Nov 23 2014 Ankur Sinha <ankursinha AT fedoraproject DOT org> 1.04-4 - Patch for rhbz1074967 -------------------------------------------------------------------------------- References: [ 1 ] Bug #1074967 - [abrt] hamster-time-tracker: overview.py:385:on_add_activate:TypeError: 'Fact' object has no attribute '__getitem__' https://bugzilla.redhat.com/show_bug.cgi?id=1074967 -------------------------------------------------------------------------------- ================================================================================ ibus-table-others-1.3.6-1.fc20 (FEDORA-2014-15696) Various tables for IBus-Table -------------------------------------------------------------------------------- Update Information: update to latest upstream 1.3.6; Fix typo in compose.txt: https://github.com/moebiuscurve/ibus-table-others/issues/12 -------------------------------------------------------------------------------- ChangeLog: * Sat Nov 22 2014 Mike FABIAN <mfabian@xxxxxxxxxx> - 1.3.6-1 - update to latest upstream 1.3.6 - Fix typo in compose.txt -------------------------------------------------------------------------------- ================================================================================ kde-connect-0.7.3-1.fc20 (FEDORA-2014-15695) KDE Connect client for communication with smartphones -------------------------------------------------------------------------------- Update Information: New stable release -------------------------------------------------------------------------------- ChangeLog: * Thu Oct 16 2014 Rex Dieter <rdieter@xxxxxxxxxxxxxxxxx> - 0.7.3-1 - kde-connect-0.7.3 - BR: libfakekey-devel (and switch other BR's to pkgconfig style) * Sat Aug 16 2014 Fedora Release Engineering <rel-eng@xxxxxxxxxxxxxxxxxxxxxxx> - 0.7.2-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild -------------------------------------------------------------------------------- ================================================================================ kernel-3.17.4-200.fc20 (FEDORA-2014-15721) The Linux kernel -------------------------------------------------------------------------------- Update Information: The 3.17.4 stable update contains a number of important fixes across the tree. -------------------------------------------------------------------------------- ChangeLog: * Fri Nov 21 2014 Justin M. Forbes <jforbes@xxxxxxxxxxxxxxxxx> - 3.17.4-200 - Linux v3.17.4 - disable early microcode load (rhbz 1163520) * Fri Nov 21 2014 Josh Boyer <jwboyer@xxxxxxxxxxxxxxxxx> - Move TPM drivers to main kernel package (rhbz 1164937) * Wed Nov 19 2014 Josh Boyer <jwboyer@xxxxxxxxxxxxxxxxx> - Disable SERIAL_8250 on s390x (rhbz 1158848) -------------------------------------------------------------------------------- References: [ 1 ] Bug #1158848 - Unable to write to /dev/console and /dev/ttyS0 on s390x https://bugzilla.redhat.com/show_bug.cgi?id=1158848 [ 2 ] Bug #1164937 - ThinkPad T540p does not resume from suspend when TPM is enabled but no driver is loaded https://bugzilla.redhat.com/show_bug.cgi?id=1164937 [ 3 ] Bug #1163520 - microcode update does not seem to be working on 3.17 https://bugzilla.redhat.com/show_bug.cgi?id=1163520 -------------------------------------------------------------------------------- ================================================================================ lua-ldoc-1.4.3-1.fc20 (FEDORA-2014-15741) Lua documentation generator -------------------------------------------------------------------------------- Update Information: Update to version 1.4.3 Features * @include tag for including Markdown documentation file directly into module docstring * `prettify_files` makes per-item links to prettified source. * link targets rendered in bright yellow to make referenced functions more obvious * add update time to footer of page * better C support: `global_lookup=true` - invoked when `parse_extra={C=true}` * `kind_names` can override names used in sidebar Fixes * `all=true` in `config.ld` did not work. * `dont_escape_underscore` logic fixed: do not use in prettified code blocks * check that `ldoc` config exists before checking field values * annotation rendering fixed * summary not dropped when using `type` sections * directory as argument case was broken * parameter names which were List methods causing mayhem * files are processed in fixed order across platforms -------------------------------------------------------------------------------- ChangeLog: * Sun Nov 23 2014 Thomas Moschny <thomas.moschny@xxxxxx> - 1.4.3-1 - Update to 1.4.3. * Sat Jun 7 2014 Fedora Release Engineering <rel-eng@xxxxxxxxxxxxxxxxxxxxxxx> - 1.4.2-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild -------------------------------------------------------------------------------- ================================================================================ nodejs-events-1.0.2-1.fc20 (FEDORA-2014-15731) Node's event emitter -------------------------------------------------------------------------------- Update Information: Initial build -------------------------------------------------------------------------------- References: [ 1 ] Bug #1161109 - Review Request:nodejs-events - Nodes event emitter https://bugzilla.redhat.com/show_bug.cgi?id=1161109 -------------------------------------------------------------------------------- ================================================================================ nodejs-mustache-0.8.2-1.fc20 (FEDORA-2014-15744) mustache.js is an implementation of the mustache template system in JavaScript -------------------------------------------------------------------------------- Update Information: Initial build -------------------------------------------------------------------------------- References: [ 1 ] Bug #1138130 - Review Request: nodejs-mustache - mustache.js is an implementation of the mustache template system in JavaScript https://bugzilla.redhat.com/show_bug.cgi?id=1138130 -------------------------------------------------------------------------------- ================================================================================ nodejs-wrappy-1.0.1-1.fc20 (FEDORA-2014-15747) Callback wrapping utility -------------------------------------------------------------------------------- Update Information: Initial build -------------------------------------------------------------------------------- References: [ 1 ] Bug #1161099 - Review Request: nodejs-wrappy - Callback wrapping utility https://bugzilla.redhat.com/show_bug.cgi?id=1161099 -------------------------------------------------------------------------------- ================================================================================ owncloud-7.0.3-2.fc20 (FEDORA-2014-15700) Private file sync and share server -------------------------------------------------------------------------------- Update Information: This update provides the latest upstream release of ownCloud, with various bugfixes - see https://owncloud.org/changelog/ . Nothing has changed in the Fedora package that should affect users, and the update should not require any special handling. -------------------------------------------------------------------------------- ChangeLog: * Tue Nov 11 2014 Adam Williamson <awilliam@xxxxxxxxxx> - 7.0.3-2 - drop unnecessary bits from 3rdparty_includes.patch - split Dropbox loading changes into a separate patch (submitted upstream) * Mon Nov 10 2014 Adam Williamson <awilliam@xxxxxxxxxx> - 7.0.3-1 - new release 7.0.3 -------------------------------------------------------------------------------- ================================================================================ perl-String-Errf-0.007-1.fc20 (FEDORA-2014-15718) Simple sprintf-like dialect -------------------------------------------------------------------------------- Update Information: This release catches more invalid inputs. -------------------------------------------------------------------------------- ChangeLog: * Mon Nov 24 2014 Petr Pisar <ppisar@xxxxxxxxxx> - 0.007-1 - 0.007 bump -------------------------------------------------------------------------------- References: [ 1 ] Bug #1163299 - perl-String-Errf-0.007 is available https://bugzilla.redhat.com/show_bug.cgi?id=1163299 -------------------------------------------------------------------------------- ================================================================================ php-horde-Horde-Core-2.17.0-1.fc20 (FEDORA-2014-15711) Horde Core Framework libraries -------------------------------------------------------------------------------- Update Information: Horde_Mail 2.5.0 * [mms] Added Horde_Mail_Rfc822_List#first() function. * [mms] Add property to address object to indicate whether it is an EAI address. * [mms] Transport driver now indicates whether it handles EAI data. * [mms] Support validation of EAI addresses (RFC 6532). * [mms] Add Horde_Mail_Mbox_Parse. Horde_Mime 2.5.1 * [mms] Fix Horde_Mime_Headers_Deprecated#addReceivedHeader(). * [mms] Fix Horde_Mime_Headers_Deprecated#listHeadersExists(). Horde_Mime 2.5.0 * [mms] Horde_Mime_Headers has been rewritten. * [mms] Correctly handle content parameters in a case-insensitive manner. * [mms] Correctly pass the 'no_body' parameter to parts embedded in a message/rfc822 part in Horde_Mime_Part#parseMessage(). * [mms] Fix parsing a base MIME-compliant message with no Content-Type information. * [mms] Horde_Mime::is8bit() no longer requires the charset parameter. * [mms] Improved MIME encoding. * [mms] Deprecated Horde_Mime::quotedPrintableEncode() and move to Horde_Mime_QuotedPrintable. * [mms] Moved MIME ID manipulation/query methods out of Horde_Mime and into Horde_Mime_Id. * [mms] Use string-based ABNF-based parser for scanning MIME content parameters instead of a regular expression (Bug #13587). * [mms] Moved content parameter handling methods out of Horde_Mime and into Horde_Mime_ContentParam. * [mms] Deprecated Horde_Mime::generateMessageId() and move to Horde_Mime_Headers. * [mms] Deprecated Horde_Mime::uudecode() and move to new Horde_Mime_Uudecode class. * [mms] Add Auto-Submitted header to outgoing MDN messages. Horde_Smtp 1.7.0 * [mms] Added Horde_Smtp_Exception property indicating whether error is permanent or transient. * [mms] Determine EAI and Body transport information by analyzing the message data, instead of requiring a parameter. * [mms] Add support for ETRN extension (RFC 1985). * [mms] Add support for BINARYMIME extension (RFC 3030). * [mms] Add support for CHUNKING extension (RFC 3030). Horde_ListHeaders 1.2.0 * [mms] Added Horde_ListHeaders#listHeadersExist(). Horde_Core 2.17.0 * [mjr] Fix issue that could cause incorrect truncation of ActiveSync emails. * [mms] Added Horde_Core_Mime_Headers_Received. * [mms] Added Horde_Registry#remoteHost(). Horde_Imap_Client 2.25.4 * [mms] Better error handling when IMAP connection is prematurely disconnected. * [mms] Fix regression in listMailboxes() for POP3 servers when 'flat' option is true. -------------------------------------------------------------------------------- ChangeLog: * Sun Nov 23 2014 Remi Collet <remi@xxxxxxxxxxxxxxxxx> - 2.17.0-1 - Update to 2.17.0 - raise dependency on Horde_Mime >= 2.5.0 -------------------------------------------------------------------------------- ================================================================================ php-horde-Horde-Imap-Client-2.25.4-1.fc20 (FEDORA-2014-15711) Horde IMAP abstraction interface -------------------------------------------------------------------------------- Update Information: Horde_Mail 2.5.0 * [mms] Added Horde_Mail_Rfc822_List#first() function. * [mms] Add property to address object to indicate whether it is an EAI address. * [mms] Transport driver now indicates whether it handles EAI data. * [mms] Support validation of EAI addresses (RFC 6532). * [mms] Add Horde_Mail_Mbox_Parse. Horde_Mime 2.5.1 * [mms] Fix Horde_Mime_Headers_Deprecated#addReceivedHeader(). * [mms] Fix Horde_Mime_Headers_Deprecated#listHeadersExists(). Horde_Mime 2.5.0 * [mms] Horde_Mime_Headers has been rewritten. * [mms] Correctly handle content parameters in a case-insensitive manner. * [mms] Correctly pass the 'no_body' parameter to parts embedded in a message/rfc822 part in Horde_Mime_Part#parseMessage(). * [mms] Fix parsing a base MIME-compliant message with no Content-Type information. * [mms] Horde_Mime::is8bit() no longer requires the charset parameter. * [mms] Improved MIME encoding. * [mms] Deprecated Horde_Mime::quotedPrintableEncode() and move to Horde_Mime_QuotedPrintable. * [mms] Moved MIME ID manipulation/query methods out of Horde_Mime and into Horde_Mime_Id. * [mms] Use string-based ABNF-based parser for scanning MIME content parameters instead of a regular expression (Bug #13587). * [mms] Moved content parameter handling methods out of Horde_Mime and into Horde_Mime_ContentParam. * [mms] Deprecated Horde_Mime::generateMessageId() and move to Horde_Mime_Headers. * [mms] Deprecated Horde_Mime::uudecode() and move to new Horde_Mime_Uudecode class. * [mms] Add Auto-Submitted header to outgoing MDN messages. Horde_Smtp 1.7.0 * [mms] Added Horde_Smtp_Exception property indicating whether error is permanent or transient. * [mms] Determine EAI and Body transport information by analyzing the message data, instead of requiring a parameter. * [mms] Add support for ETRN extension (RFC 1985). * [mms] Add support for BINARYMIME extension (RFC 3030). * [mms] Add support for CHUNKING extension (RFC 3030). Horde_ListHeaders 1.2.0 * [mms] Added Horde_ListHeaders#listHeadersExist(). Horde_Core 2.17.0 * [mjr] Fix issue that could cause incorrect truncation of ActiveSync emails. * [mms] Added Horde_Core_Mime_Headers_Received. * [mms] Added Horde_Registry#remoteHost(). Horde_Imap_Client 2.25.4 * [mms] Better error handling when IMAP connection is prematurely disconnected. * [mms] Fix regression in listMailboxes() for POP3 servers when 'flat' option is true. -------------------------------------------------------------------------------- ChangeLog: * Sun Nov 23 2014 Remi Collet <remi@xxxxxxxxxxxxxxxxx> - 2.25.4-1 - Update to 2.25.4 - raise dependency on Horde_Mime >= 2.5.0 -------------------------------------------------------------------------------- ================================================================================ php-horde-Horde-ListHeaders-1.2.0-1.fc20 (FEDORA-2014-15711) Horde List Headers Parsing Library -------------------------------------------------------------------------------- Update Information: Horde_Mail 2.5.0 * [mms] Added Horde_Mail_Rfc822_List#first() function. * [mms] Add property to address object to indicate whether it is an EAI address. * [mms] Transport driver now indicates whether it handles EAI data. * [mms] Support validation of EAI addresses (RFC 6532). * [mms] Add Horde_Mail_Mbox_Parse. Horde_Mime 2.5.1 * [mms] Fix Horde_Mime_Headers_Deprecated#addReceivedHeader(). * [mms] Fix Horde_Mime_Headers_Deprecated#listHeadersExists(). Horde_Mime 2.5.0 * [mms] Horde_Mime_Headers has been rewritten. * [mms] Correctly handle content parameters in a case-insensitive manner. * [mms] Correctly pass the 'no_body' parameter to parts embedded in a message/rfc822 part in Horde_Mime_Part#parseMessage(). * [mms] Fix parsing a base MIME-compliant message with no Content-Type information. * [mms] Horde_Mime::is8bit() no longer requires the charset parameter. * [mms] Improved MIME encoding. * [mms] Deprecated Horde_Mime::quotedPrintableEncode() and move to Horde_Mime_QuotedPrintable. * [mms] Moved MIME ID manipulation/query methods out of Horde_Mime and into Horde_Mime_Id. * [mms] Use string-based ABNF-based parser for scanning MIME content parameters instead of a regular expression (Bug #13587). * [mms] Moved content parameter handling methods out of Horde_Mime and into Horde_Mime_ContentParam. * [mms] Deprecated Horde_Mime::generateMessageId() and move to Horde_Mime_Headers. * [mms] Deprecated Horde_Mime::uudecode() and move to new Horde_Mime_Uudecode class. * [mms] Add Auto-Submitted header to outgoing MDN messages. Horde_Smtp 1.7.0 * [mms] Added Horde_Smtp_Exception property indicating whether error is permanent or transient. * [mms] Determine EAI and Body transport information by analyzing the message data, instead of requiring a parameter. * [mms] Add support for ETRN extension (RFC 1985). * [mms] Add support for BINARYMIME extension (RFC 3030). * [mms] Add support for CHUNKING extension (RFC 3030). Horde_ListHeaders 1.2.0 * [mms] Added Horde_ListHeaders#listHeadersExist(). Horde_Core 2.17.0 * [mjr] Fix issue that could cause incorrect truncation of ActiveSync emails. * [mms] Added Horde_Core_Mime_Headers_Received. * [mms] Added Horde_Registry#remoteHost(). Horde_Imap_Client 2.25.4 * [mms] Better error handling when IMAP connection is prematurely disconnected. * [mms] Fix regression in listMailboxes() for POP3 servers when 'flat' option is true. -------------------------------------------------------------------------------- ChangeLog: * Sun Nov 23 2014 Remi Collet <remi@xxxxxxxxxxxxxxxxx> - 1.2.0-1 - Update to 1.2.0 - raise dependency on Horde_Translation >= 2.2.0 -------------------------------------------------------------------------------- ================================================================================ php-horde-Horde-Mail-2.5.0-1.fc20 (FEDORA-2014-15711) Horde Mail Library -------------------------------------------------------------------------------- Update Information: Horde_Mail 2.5.0 * [mms] Added Horde_Mail_Rfc822_List#first() function. * [mms] Add property to address object to indicate whether it is an EAI address. * [mms] Transport driver now indicates whether it handles EAI data. * [mms] Support validation of EAI addresses (RFC 6532). * [mms] Add Horde_Mail_Mbox_Parse. Horde_Mime 2.5.1 * [mms] Fix Horde_Mime_Headers_Deprecated#addReceivedHeader(). * [mms] Fix Horde_Mime_Headers_Deprecated#listHeadersExists(). Horde_Mime 2.5.0 * [mms] Horde_Mime_Headers has been rewritten. * [mms] Correctly handle content parameters in a case-insensitive manner. * [mms] Correctly pass the 'no_body' parameter to parts embedded in a message/rfc822 part in Horde_Mime_Part#parseMessage(). * [mms] Fix parsing a base MIME-compliant message with no Content-Type information. * [mms] Horde_Mime::is8bit() no longer requires the charset parameter. * [mms] Improved MIME encoding. * [mms] Deprecated Horde_Mime::quotedPrintableEncode() and move to Horde_Mime_QuotedPrintable. * [mms] Moved MIME ID manipulation/query methods out of Horde_Mime and into Horde_Mime_Id. * [mms] Use string-based ABNF-based parser for scanning MIME content parameters instead of a regular expression (Bug #13587). * [mms] Moved content parameter handling methods out of Horde_Mime and into Horde_Mime_ContentParam. * [mms] Deprecated Horde_Mime::generateMessageId() and move to Horde_Mime_Headers. * [mms] Deprecated Horde_Mime::uudecode() and move to new Horde_Mime_Uudecode class. * [mms] Add Auto-Submitted header to outgoing MDN messages. Horde_Smtp 1.7.0 * [mms] Added Horde_Smtp_Exception property indicating whether error is permanent or transient. * [mms] Determine EAI and Body transport information by analyzing the message data, instead of requiring a parameter. * [mms] Add support for ETRN extension (RFC 1985). * [mms] Add support for BINARYMIME extension (RFC 3030). * [mms] Add support for CHUNKING extension (RFC 3030). Horde_ListHeaders 1.2.0 * [mms] Added Horde_ListHeaders#listHeadersExist(). Horde_Core 2.17.0 * [mjr] Fix issue that could cause incorrect truncation of ActiveSync emails. * [mms] Added Horde_Core_Mime_Headers_Received. * [mms] Added Horde_Registry#remoteHost(). Horde_Imap_Client 2.25.4 * [mms] Better error handling when IMAP connection is prematurely disconnected. * [mms] Fix regression in listMailboxes() for POP3 servers when 'flat' option is true. -------------------------------------------------------------------------------- ChangeLog: * Sun Nov 23 2014 Remi Collet <remi@xxxxxxxxxxxxxxxxx> - 2.5.0-1 - Update to 2.5.0 - add dependency on Horde_Translation -------------------------------------------------------------------------------- ================================================================================ php-horde-Horde-Mime-2.5.1-1.fc20 (FEDORA-2014-15711) Horde MIME Library -------------------------------------------------------------------------------- Update Information: Horde_Mail 2.5.0 * [mms] Added Horde_Mail_Rfc822_List#first() function. * [mms] Add property to address object to indicate whether it is an EAI address. * [mms] Transport driver now indicates whether it handles EAI data. * [mms] Support validation of EAI addresses (RFC 6532). * [mms] Add Horde_Mail_Mbox_Parse. Horde_Mime 2.5.1 * [mms] Fix Horde_Mime_Headers_Deprecated#addReceivedHeader(). * [mms] Fix Horde_Mime_Headers_Deprecated#listHeadersExists(). Horde_Mime 2.5.0 * [mms] Horde_Mime_Headers has been rewritten. * [mms] Correctly handle content parameters in a case-insensitive manner. * [mms] Correctly pass the 'no_body' parameter to parts embedded in a message/rfc822 part in Horde_Mime_Part#parseMessage(). * [mms] Fix parsing a base MIME-compliant message with no Content-Type information. * [mms] Horde_Mime::is8bit() no longer requires the charset parameter. * [mms] Improved MIME encoding. * [mms] Deprecated Horde_Mime::quotedPrintableEncode() and move to Horde_Mime_QuotedPrintable. * [mms] Moved MIME ID manipulation/query methods out of Horde_Mime and into Horde_Mime_Id. * [mms] Use string-based ABNF-based parser for scanning MIME content parameters instead of a regular expression (Bug #13587). * [mms] Moved content parameter handling methods out of Horde_Mime and into Horde_Mime_ContentParam. * [mms] Deprecated Horde_Mime::generateMessageId() and move to Horde_Mime_Headers. * [mms] Deprecated Horde_Mime::uudecode() and move to new Horde_Mime_Uudecode class. * [mms] Add Auto-Submitted header to outgoing MDN messages. Horde_Smtp 1.7.0 * [mms] Added Horde_Smtp_Exception property indicating whether error is permanent or transient. * [mms] Determine EAI and Body transport information by analyzing the message data, instead of requiring a parameter. * [mms] Add support for ETRN extension (RFC 1985). * [mms] Add support for BINARYMIME extension (RFC 3030). * [mms] Add support for CHUNKING extension (RFC 3030). Horde_ListHeaders 1.2.0 * [mms] Added Horde_ListHeaders#listHeadersExist(). Horde_Core 2.17.0 * [mjr] Fix issue that could cause incorrect truncation of ActiveSync emails. * [mms] Added Horde_Core_Mime_Headers_Received. * [mms] Added Horde_Registry#remoteHost(). Horde_Imap_Client 2.25.4 * [mms] Better error handling when IMAP connection is prematurely disconnected. * [mms] Fix regression in listMailboxes() for POP3 servers when 'flat' option is true. -------------------------------------------------------------------------------- ChangeLog: * Mon Nov 24 2014 Remi Collet <remi@xxxxxxxxxxxxxxxxx> - 2.5.1-1 - Update to 2.5.1 * Sun Nov 23 2014 Remi Collet <remi@xxxxxxxxxxxxxxxxx> - 2.5.0-1 - Update to 2.5.0 - add dependency on Horde_ListHeaders - raise dependency on Horde_Mail >= 2.5.0 - raise dependency on Horde_Translation >= 2.2.0 -------------------------------------------------------------------------------- ================================================================================ php-horde-Horde-Smtp-1.7.0-1.fc20 (FEDORA-2014-15711) Horde SMTP Client -------------------------------------------------------------------------------- Update Information: Horde_Mail 2.5.0 * [mms] Added Horde_Mail_Rfc822_List#first() function. * [mms] Add property to address object to indicate whether it is an EAI address. * [mms] Transport driver now indicates whether it handles EAI data. * [mms] Support validation of EAI addresses (RFC 6532). * [mms] Add Horde_Mail_Mbox_Parse. Horde_Mime 2.5.1 * [mms] Fix Horde_Mime_Headers_Deprecated#addReceivedHeader(). * [mms] Fix Horde_Mime_Headers_Deprecated#listHeadersExists(). Horde_Mime 2.5.0 * [mms] Horde_Mime_Headers has been rewritten. * [mms] Correctly handle content parameters in a case-insensitive manner. * [mms] Correctly pass the 'no_body' parameter to parts embedded in a message/rfc822 part in Horde_Mime_Part#parseMessage(). * [mms] Fix parsing a base MIME-compliant message with no Content-Type information. * [mms] Horde_Mime::is8bit() no longer requires the charset parameter. * [mms] Improved MIME encoding. * [mms] Deprecated Horde_Mime::quotedPrintableEncode() and move to Horde_Mime_QuotedPrintable. * [mms] Moved MIME ID manipulation/query methods out of Horde_Mime and into Horde_Mime_Id. * [mms] Use string-based ABNF-based parser for scanning MIME content parameters instead of a regular expression (Bug #13587). * [mms] Moved content parameter handling methods out of Horde_Mime and into Horde_Mime_ContentParam. * [mms] Deprecated Horde_Mime::generateMessageId() and move to Horde_Mime_Headers. * [mms] Deprecated Horde_Mime::uudecode() and move to new Horde_Mime_Uudecode class. * [mms] Add Auto-Submitted header to outgoing MDN messages. Horde_Smtp 1.7.0 * [mms] Added Horde_Smtp_Exception property indicating whether error is permanent or transient. * [mms] Determine EAI and Body transport information by analyzing the message data, instead of requiring a parameter. * [mms] Add support for ETRN extension (RFC 1985). * [mms] Add support for BINARYMIME extension (RFC 3030). * [mms] Add support for CHUNKING extension (RFC 3030). Horde_ListHeaders 1.2.0 * [mms] Added Horde_ListHeaders#listHeadersExist(). Horde_Core 2.17.0 * [mjr] Fix issue that could cause incorrect truncation of ActiveSync emails. * [mms] Added Horde_Core_Mime_Headers_Received. * [mms] Added Horde_Registry#remoteHost(). Horde_Imap_Client 2.25.4 * [mms] Better error handling when IMAP connection is prematurely disconnected. * [mms] Fix regression in listMailboxes() for POP3 servers when 'flat' option is true. -------------------------------------------------------------------------------- ChangeLog: * Sun Nov 23 2014 Remi Collet <remi@xxxxxxxxxxxxxxxxx> - 1.7.0-1 - Update to 1.7.0 - raise dependency on Horde_Translation >= 2.2.0 -------------------------------------------------------------------------------- ================================================================================ php-horde-nag-4.2.3-1.fc20 (FEDORA-2014-15710) A web based task list manager -------------------------------------------------------------------------------- Update Information: nag 4.2.3 * [mjr] Fix issue with initially creating nag_shares table. -------------------------------------------------------------------------------- ChangeLog: * Fri Nov 21 2014 Remi Collet <remi@xxxxxxxxxxxxxxxxx> - 4.2.3-1 - Update to 4.2.3 -------------------------------------------------------------------------------- ================================================================================ php-opencloud-1.11.0-3.fc20 (FEDORA-2014-15728) PHP SDK for OpenStack/Rackspace APIs -------------------------------------------------------------------------------- Update Information: RPM-only release: Removed php-cloudfiles obsolete The PHP SDK should work with most OpenStack-based cloud deployments, though it specifically targets the Rackspace public cloud. In general, whenever a Rackspace deployment is substantially different than a pure OpenStack one, a separate Rackspace subclass is provided so that you can still use the SDK with a pure OpenStack instance (for example, see the OpenStack class (for OpenStack) and the Rackspace subclass). The PHP SDK should work with most OpenStack-based cloud deployments, though it specifically targets the Rackspace public cloud. In general, whenever a Rackspace deployment is substantially different than a pure OpenStack one, a separate Rackspace subclass is provided so that you can still use the SDK with a pure OpenStack instance (for example, see the OpenStack class (for OpenStack) and the Rackspace subclass). -------------------------------------------------------------------------------- ChangeLog: * Sat Nov 22 2014 Shawn Iwinski <shawn.iwinski@xxxxxxxxx> - 1.11.0-3 - Removed obsolete of php-cloudfiles -------------------------------------------------------------------------------- References: [ 1 ] Bug #1159522 - php-opencloud-1.11.0 is available https://bugzilla.redhat.com/show_bug.cgi?id=1159522 -------------------------------------------------------------------------------- ================================================================================ python-flask-rstpages-0.3-3.fc20 (FEDORA-2014-15704) Adds support for reStructuredText to a Flask application -------------------------------------------------------------------------------- Update Information: Add conditionals for EPEL -------------------------------------------------------------------------------- References: [ 1 ] Bug #1148529 - Review Request: python-flask-rstpages - Adds support for reStructuredText to a Flask application https://bugzilla.redhat.com/show_bug.cgi?id=1148529 -------------------------------------------------------------------------------- ================================================================================ python-husl-4.0.1-1.fc20 (FEDORA-2014-15707) A Python implementation of HUSL -------------------------------------------------------------------------------- Update Information: A python implementation of HUSL -------------------------------------------------------------------------------- ================================================================================ python-rhsm-1.13.8-1.fc20 (FEDORA-2014-15727) A Python library to communicate with a Red Hat Unified Entitlement Platform -------------------------------------------------------------------------------- Update Information: Bug fixes and updated translations. -------------------------------------------------------------------------------- ChangeLog: * Fri Nov 21 2014 William Poteat <wpoteat@xxxxxxxxxx> 1.13.8-1 - * Fri Nov 7 2014 Unknown name <wpoteat@xxxxxxxxxx> 1.13.7-1 - -------------------------------------------------------------------------------- ================================================================================ python-watchdog-0.8.2-1.fc20 (FEDORA-2014-15694) File system events monitoring -------------------------------------------------------------------------------- Update Information: First import of python-watchdog after the review -------------------------------------------------------------------------------- References: [ 1 ] Bug #1089392 - Review Request: python-watchdog - Filesystem events monitoring https://bugzilla.redhat.com/show_bug.cgi?id=1089392 -------------------------------------------------------------------------------- ================================================================================ skf-1.99.10-1.fc20 (FEDORA-2014-15720) Utility binary files in Simple Kanji Filter -------------------------------------------------------------------------------- Update Information: New version 1.99.10 is released. -------------------------------------------------------------------------------- ChangeLog: * Sun Nov 23 2014 Mamoru TASAKA <mtasaka@xxxxxxxxxxxxxxxxx> - 1.99.10-1 - 1.99.10 -------------------------------------------------------------------------------- ================================================================================ subscription-manager-1.13.9-1.fc20 (FEDORA-2014-15727) Tools and libraries for subscription and repository management -------------------------------------------------------------------------------- Update Information: Bug fixes and updated translations. -------------------------------------------------------------------------------- ChangeLog: * Fri Nov 21 2014 William Poteat <wpoteat@xxxxxxxxxx> 1.13.9-1 - Move ostree config to /etc/ostree/remotes.d/redhat.conf (alikins@xxxxxxxxxx) - 1147463: Log py.warnings to shutup gobject warning (alikins@xxxxxxxxxx) - 1159266: rhsm-icon -i fails with "TypeError: 'NoneType' object has no attribute '__getitem__'" (wpoteat@xxxxxxxxxx) - 1145833: Do not package sat5to6 with subscription-manager. (awood@xxxxxxxxxx) - 1156627: Fix list consumed matching no service level to "". (dgoodwin@xxxxxxxxxx) - 1162331: Changed how debug_commands.py prints errors. (crog@xxxxxxxxxx) - 1160150: Repos --list leads to deletion of certificates imported to a system (wpoteat@xxxxxxxxxx) - 1162170: Added error output when --pool-only is used with --installed. (crog@xxxxxxxxxx) - 990183: Fix typos in the new man page (bkearney@xxxxxxxxxx) - 1161694: Modify the --pool-id-only to be --pool-only in bash completion and man page (bkearney@xxxxxxxxxx) - Use .format strings for --ondate example message (alikins@xxxxxxxxxx) - 1113741: Fix rhsmd traceback on 502 errors. (alikins@xxxxxxxxxx) - 1157387: Fix incorrect no installed products detected status in GUI. (dgoodwin@xxxxxxxxxx) * Fri Nov 7 2014 Unknown name <wpoteat@xxxxxxxxxx> 1.13.8-1 - Added support for attaching pools from a file/stdin. (crog@xxxxxxxxxx) - Revert "1046132: Makes rhsm-icon slightly less annoying." (dgoodwin@xxxxxxxxxx) - Further improved exit code standardization (crog@xxxxxxxxxx) - 1119688: Improved output of the status module (crog@xxxxxxxxxx) - Make repolib tag matching use model.find_content (alikins@xxxxxxxxxx) - Added the --pool-only option to subman's list command. (crog@xxxxxxxxxx) - 1157761: Fixed incorrect option usage in migration tool. (crog@xxxxxxxxxx) - 1157761: revert to "--servicelevel" (alikins@xxxxxxxxxx) - 1119688: Improved error code usage in subman. (crog@xxxxxxxxxx) * Mon Oct 27 2014 Devan Goodwin <dgoodwin@xxxxxxxx> 1.13.7-1 - Add content/product tag matching for content plugins. (alikins@xxxxxxxxxx) - Remove ostree 'unconfigured' after configuring. (alikins@xxxxxxxxxx) - Symlink to redhat-uep.pem if we seem to be syncing a CDN hostname cert dir. (dgoodwin@xxxxxxxxxx) - Add a test for removing 'unconfigured-state' from origin (alikins@xxxxxxxxxx) - Case insensitive content type searching. (dgoodwin@xxxxxxxxxx) - Added container plugin for configuring Docker. (dgoodwin@xxxxxxxxxx) -------------------------------------------------------------------------------- ================================================================================ teeworlds-0.6.3-1.fc20 (FEDORA-2014-15701) Online multi-player platform 2D shooter -------------------------------------------------------------------------------- Update Information: 0.6.3 (RHBZ #1167167,#1167168) -------------------------------------------------------------------------------- ChangeLog: * Mon Nov 24 2014 Igor Gnatenko <i.gnatenko.brain@xxxxxxxxx> - 0.6.3-1 - 0.6.3 (RHBZ #1167167,#1167168) * Mon Aug 18 2014 Fedora Release Engineering <rel-eng@xxxxxxxxxxxxxxxxxxxxxxx> - 0.6.2-9 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild * Sun Jun 8 2014 Fedora Release Engineering <rel-eng@xxxxxxxxxxxxxxxxxxxxxxx> - 0.6.2-8 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild -------------------------------------------------------------------------------- References: [ 1 ] Bug #1167167 - teeworlds: security issues fixed in the 0.6.3 release https://bugzilla.redhat.com/show_bug.cgi?id=1167167 -------------------------------------------------------------------------------- ================================================================================ v4l-utils-1.6.2-1.fc20 (FEDORA-2014-15722) Utilities for video4linux and DVB devices -------------------------------------------------------------------------------- Update Information: Backport v4l2 maintainance release version 1.6.2, with addresses several issues: - v4l2-ctl: sliced VBI parsing, u32 control, array handling, buffer overflow; - v4l2-compliance: fix number of buffers, checks for EXT_CTRL; - man pages: remove duplicate badkslash, unicode fixes; - build: explicit link against rt for v4l2-ctl and 4l2-compliance; - libdvbv5: properly represent satellite frequencies; - ir-keytable: RC6 fixups, allwinner table fixup; - v4lconvert: fix decoding of jpeg data. - Fix crash when decoding 1920x1080 jpeg to YUV420 - Fix crash when decoding 1920x1080 jpeg to YUV420 -------------------------------------------------------------------------------- ChangeLog: * Sat Nov 22 2014 Mauro Carvalho Chehab <mchehab@xxxxxxxxxxxxxxx> - 1.6.2-1 - Update to version 1.6.2 with contains several bugfixes * Thu Nov 20 2014 Hans de Goede <hdegoede@xxxxxxxxxx> - 1.6.0-2 - Fix crash when decoding 1920x1080 jpeg to YUV420 * Sun Oct 5 2014 Mauro Carvalho Chehab - 1.6.0-1 - Upgrade to version 1.6.0 * Mon Sep 8 2014 Mauro Carvalho Chehab - 1.4.0-1 - Upgrade to version 1.4.0 * Fri Aug 22 2014 Mauro Carvalho Chehab - 1.2.1-3 - Add ALSA support on qv4l2 and fix a couple issues at spec file * Thu Aug 21 2014 Mauro Carvalho Chehab - 1.2.1-2 - Update to version 1.2.1 and add package for libdvbv5 * Mon Aug 18 2014 Fedora Release Engineering <rel-eng@xxxxxxxxxxxxxxxxxxxxxxx> - 1.0.0-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild * Sun Jun 8 2014 Fedora Release Engineering <rel-eng@xxxxxxxxxxxxxxxxxxxxxxx> - 1.0.0-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild -------------------------------------------------------------------------------- ================================================================================ xca-1.1.0-1.fc20 (FEDORA-2014-15703) Graphical X.509 certificate management tool -------------------------------------------------------------------------------- Update Information: New upstream release Patch "nonstdext" avoids segfault when viewing cert with non-standard extension. https://bugzilla.redhat.com/show_bug.cgi?id=1164340 Patch "nonstdext" avoids segfault when viewing cert with non-standard extension. https://bugzilla.redhat.com/show_bug.cgi?id=1164340 -------------------------------------------------------------------------------- ChangeLog: * Mon Nov 24 2014 Patrick Monnerat <pm@xxxxxxxxxxxxx> 1.1.0-1 - New upstream release * Mon Nov 17 2014 Patrick Monnerat <pm@xxxxxxxxxxxxx> 1.0.0-2 - Patch "nonstdext" avoids segfault when viewing cert with non-standard extension. https://bugzilla.redhat.com/show_bug.cgi?id=1164340 -------------------------------------------------------------------------------- References: [ 1 ] Bug #1164340 - segfault when viewing a RHEL entitlement certificate in X509V3_EXT_get v3_lib.c:15 https://bugzilla.redhat.com/show_bug.cgi?id=1164340 -------------------------------------------------------------------------------- ================================================================================ ykpers-1.16.1-1.fc20 (FEDORA-2014-15705) Yubikey personalization program -------------------------------------------------------------------------------- Update Information: Update to 1.16.1. Fixes bugs #1167113 and #1157894 -------------------------------------------------------------------------------- ChangeLog: * Sun Nov 23 2014 Kevin Fenzi <kevin@xxxxxxxxx> 1.16.1-1 - Update to 1.16.1. Fixes bugs #1167113 and #1157894 * Mon Aug 18 2014 Fedora Release Engineering <rel-eng@xxxxxxxxxxxxxxxxxxxxxxx> - 1.15.1-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild * Sat Jun 7 2014 Fedora Release Engineering <rel-eng@xxxxxxxxxxxxxxxxxxxxxxx> - 1.15.1-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild -------------------------------------------------------------------------------- References: [ 1 ] Bug #1167113 - Upgrade to 1.16.1 version in order to support 3.3.x firmware cards https://bugzilla.redhat.com/show_bug.cgi?id=1167113 [ 2 ] Bug #1157894 - F20 - Yubikey U2F (FIDO) Not Supported https://bugzilla.redhat.com/show_bug.cgi?id=1157894 -------------------------------------------------------------------------------- -- test mailing list test@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe: https://admin.fedoraproject.org/mailman/listinfo/test