[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

Fedora EPEL 6 updates-testing report



The following Fedora EPEL 6 Security updates need testing:

    https://admin.fedoraproject.org/updates/asterisk-1.8.4.4-1.el6
    https://admin.fedoraproject.org/updates/drupal7-7.4-1.el6
    https://admin.fedoraproject.org/updates/wordpress-3.1.4-1.el6
    https://admin.fedoraproject.org/updates/dokuwiki-0-0.8.20110525.a.el6
    https://admin.fedoraproject.org/updates/mingw32-libpng-1.2.37-3.el6
    https://admin.fedoraproject.org/updates/libpng10-1.0.54-3.el6
    https://admin.fedoraproject.org/updates/libmodplug-0.8.8.3-2.el6
    https://admin.fedoraproject.org/updates/ejabberd-2.1.8-2.el6
    https://admin.fedoraproject.org/updates/erlang-R14B-02.1.el6


The following builds have been pushed to Fedora EPEL 6 updates-testing

    asterisk-1.8.4.4-1.el6
    drupal6-6.22-3.el6
    drupal6-feeds-1.0-0.6.beta11.el6
    drupal7-7.4-1.el6
    naev-0.5.0-3.el6
    naev-data-0.5.0-4.el6
    python-taboot-0.3.0-1.el6
    root-5.28.00e-2.el6
    rubygem-gem2rpm-0.7.1-1.el6
    swatch-3.2.3-2.el6
    wordpress-3.1.4-1.el6

Details about builds:


================================================================================
 asterisk-1.8.4.4-1.el6 (FEDORA-EPEL-2011-3678)
 The Open Source PBX
--------------------------------------------------------------------------------
Update Information:

The Asterisk Development Team has announced the release of Asterisk versions
1.4.41.2, 1.6.2.18.2, and 1.8.4.4, which are security releases.

These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases

The release of Asterisk 1.4.41.2, 1.6.2.18.2, and 1.8.4.4 resolves the
following issue:

AST-2011-011: Asterisk may respond differently to SIP requests from an
invalid SIP user than it does to a user configured on the system, even when the
alwaysauthreject option is set in the configuration. This can leak information
about what SIP users are valid on the Asterisk system.

For more information about the details of this vulnerability, please read
the security advisory AST-2011-011, which was released at the same time as this
announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.4.41.2
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.18.2
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.4.4

Security advisory AST-2011-011 is available at:

http://downloads.asterisk.org/pub/security/AST-2011-011.pdf
The Asterisk Development Team has announced the release of Asterisk versions
1.4.41.1, 1.6.2.18.1, and 1.8.4.3, which are security releases.

These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases

The release of Asterisk 1.4.41.1, 1.6.2.18, and 1.8.4.3 resolves several issues
as outlined below:

* AST-2011-008: If a remote user sends a SIP packet containing a null,
 Asterisk assumes available data extends past the null to the
 end of the packet when the buffer is actually truncated when
 copied.  This causes SIP header parsing to modify data past
 the end of the buffer altering unrelated memory structures.
 This vulnerability does not affect TCP/TLS connections.
 -- Resolved in 1.6.2.18.1 and 1.8.4.3

* AST-2011-009: A remote user sending a SIP packet containing a Contact header
 with a missing left angle bracket (<) causes Asterisk to
 access a null pointer.
 -- Resolved in 1.8.4.3

* AST-2011-010: A memory address was inadvertently transmitted over the
 network via IAX2 via an option control frame and the remote party would try
 to access it.
 -- Resolved in 1.4.41.1, 1.6.2.18.1, and 1.8.4.3


The issues and resolutions are described in the AST-2011-008, AST-2011-009, and
AST-2011-010 security advisories.

For more information about the details of these vulnerabilities, please read
the security advisories AST-2011-008, AST-2011-009, and AST-2011-010, which were
released at the same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.4.41.1
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.18.1
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.4.3

Security advisories AST-2011-008, AST-2011-009, and AST-2011-010 are available
at:

http://downloads.asterisk.org/pub/security/AST-2011-008.pdf
http://downloads.asterisk.org/pub/security/AST-2011-009.pdf
http://downloads.asterisk.org/pub/security/AST-2011-010.pdf

The Asterisk Development Team has announced the release of Asterisk
version 1.8.4.2, which is a security release for Asterisk 1.8.

This release is available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases

The release of Asterisk 1.8.4.2 resolves an issue with SIP URI
parsing which can lead to a remotely exploitable crash:

   Remote Crash Vulnerability in SIP channel driver (AST-2011-007)

The issue and resolution is described in the AST-2011-007 security
advisory.

For more information about the details of this vulnerability, please
read the security advisory AST-2011-007, which was released at the
same time as this announcement.

For a full list of changes in the current release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.4.2

Security advisory AST-2011-007 is available at:

http://downloads.asterisk.org/pub/security/AST-2011-007.pdf

The Asterisk Development Team has announced the release of Asterisk 1.8.4.1.
This release is available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/

The release of Asterisk 1.8.4.1 resolves several issues reported by the
community. Without your help this release would not have been possible.
Thank you!

Below is a list of issues resolved in this release:

 * Fix our compliance with RFC 3261 section 18.2.2. (aka Cisco phone fix)
  (Closes issue #18951. Reported by jmls. Patched by wdoekes)

 * Resolve a change in IPv6 header parsing due to the Cisco phone fix issue.
  This issue was found and reported by the Asterisk test suite.
  (Closes issue #18951. Patched by mnicholson)

 * Resolve potential crash when using SIP TLS support.
  (Closes issue #19192. Reported by stknob. Patched by Chainsaw. Tested by
   vois, Chainsaw)

 * Improve reliability when using SIP TLS.
  (Closes issue #19182. Reported by st. Patched by mnicholson)


For a full list of changes in this release candidate, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.4.1

The Asterisk Development Team has announced the release of Asterisk 1.8.4. This
release is available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/

The release of Asterisk 1.8.4 resolves several issues reported by the community.
Without your help this release would not have been possible. Thank you!

Below is a sample of the issues resolved in this release:

 * Use SSLv23_client_method instead of old SSLv2 only.
  (Closes issue #19095, #19138. Reported, patched by tzafrir. Tested by russell
  and chazzam.

 * Resolve crash in ast_mutex_init()
  (Patched by twilson)

 * Resolution of several DTMF based attended transfer issues.
  (Closes issue #17999, #17096, #18395, #17273. Reported by iskatel, gelo,
  shihchuan, grecco. Patched by rmudgett)

  NOTE: Be sure to read the ChangeLog for more information about these changes.

 * Resolve deadlocks related to device states in chan_sip
  (Closes issue #18310. Reported, patched by one47. Patched by jpeeler)

 * Resolve an issue with the Asterisk manager interface leaking memory when
  disabled.
  (Reported internally by kmorgan. Patched by russellb)

 * Support greetingsfolder as documented in voicemail.conf.sample.
  (Closes issue #17870. Reported by edhorton. Patched by seanbright)

 * Fix channel redirect out of MeetMe() and other issues with channel softhangup
  (Closes issue #18585. Reported by oej. Tested by oej, wedhorn, russellb.
  Patched by russellb)

 * Fix voicemail sequencing for file based storage.
  (Closes issue #18498, #18486. Reported by JJCinAZ, bluefox. Patched by
  jpeeler)

 * Set hangup cause in local_hangup so the proper return code of 486 instead of
  503 when using Local channels when the far sides returns a busy. Also affects
  CCSS in Asterisk 1.8+.
  (Patched by twilson)

 * Fix issues with verbose messages not being output to the console.
  (Closes issue #18580. Reported by pabelanger. Patched by qwell)

 * Fix Deadlock with attended transfer of SIP call
  (Closes issue #18837. Reported, patched by alecdavis. Tested by
  alecdavid, Irontec, ZX81, cmaj)

Includes changes per AST-2011-005 and AST-2011-006
For a full list of changes in this release candidate, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.4

Information about the security releases are available at:

http://downloads.asterisk.org/pub/security/AST-2011-005.pdf
http://downloads.asterisk.org/pub/security/AST-2011-006.pdf

--------------------------------------------------------------------------------
ChangeLog:

* Wed Jun 29 2011 Jeffrey C. Ollie <jeff ocjtech us> - 1.8.4.4-1
- The Asterisk Development Team has announced the release of Asterisk
- versions 1.4.41.2, 1.6.2.18.2, and 1.8.4.4, which are security
- releases.
-
- These releases are available for immediate download at
- http://downloads.asterisk.org/pub/telephony/asterisk/releases
-
- The release of Asterisk 1.4.41.2, 1.6.2.18.2, and 1.8.4.4 resolves the
- following issue:
-
- AST-2011-011: Asterisk may respond differently to SIP requests from an
- invalid SIP user than it does to a user configured on the system, even
- when the alwaysauthreject option is set in the configuration. This can
- leak information about what SIP users are valid on the Asterisk
- system.
-
- For more information about the details of this vulnerability, please
- read the security advisory AST-2011-011, which was released at the
- same time as this announcement.
-
- For a full list of changes in the current releases, please see the ChangeLog:
-
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.4.41.2
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.18.2
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.4.4
-
- Security advisory AST-2011-011 is available at:
-
- http://downloads.asterisk.org/pub/security/AST-2011-011.pdf
* Mon Jun 27 2011 Jeffrey C. Ollie <jeff ocjtech us> - 1.8.4.3-3
- Don't forget stereorize
* Mon Jun 27 2011 Jeffrey C. Ollie <jeff ocjtech us> - 1.8.4.3-2
- Move /var/run/asterisk to /run/asterisk
- Add comments to systemd service file on how to mimic safe_asterisk functionality
- Build more of the optional binaries
- Install the tmpfiles.d configuration on Fedora 15
* Fri Jun 24 2011 Jeffrey C. Ollie <jeff ocjtech us> - 1.8.4.3-1
- The Asterisk Development Team has announced the release of Asterisk versions
- 1.4.41.1, 1.6.2.18.1, and 1.8.4.3, which are security releases.
-
- These releases are available for immediate download at
- http://downloads.asterisk.org/pub/telephony/asterisk/releases
-
- The release of Asterisk 1.4.41.1, 1.6.2.18, and 1.8.4.3 resolves several issues
- as outlined below:
-
- * AST-2011-008: If a remote user sends a SIP packet containing a null,
-  Asterisk assumes available data extends past the null to the
-  end of the packet when the buffer is actually truncated when
-  copied.  This causes SIP header parsing to modify data past
-  the end of the buffer altering unrelated memory structures.
-  This vulnerability does not affect TCP/TLS connections.
-  -- Resolved in 1.6.2.18.1 and 1.8.4.3
-
- * AST-2011-009: A remote user sending a SIP packet containing a Contact header
-  with a missing left angle bracket (<) causes Asterisk to
-  access a null pointer.
-  -- Resolved in 1.8.4.3
-
- * AST-2011-010: A memory address was inadvertently transmitted over the
-  network via IAX2 via an option control frame and the remote party would try
-  to access it.
-  -- Resolved in 1.4.41.1, 1.6.2.18.1, and 1.8.4.3
-
- The issues and resolutions are described in the AST-2011-008, AST-2011-009, and
- AST-2011-010 security advisories.
-
- For more information about the details of these vulnerabilities, please read
- the security advisories AST-2011-008, AST-2011-009, and AST-2011-010, which were
- released at the same time as this announcement.
-
- For a full list of changes in the current releases, please see the ChangeLog:
-
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.4.41.1
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.18.1
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.4.3
-
- Security advisories AST-2011-008, AST-2011-009, and AST-2011-010 are available
- at:
-
- http://downloads.asterisk.org/pub/security/AST-2011-008.pdf
- http://downloads.asterisk.org/pub/security/AST-2011-009.pdf
- http://downloads.asterisk.org/pub/security/AST-2011-010.pdf
* Tue Jun 21 2011 Jeffrey C. Ollie <jeff ocjtech us> - 1.8.4.2-2
- Convert to systemd
* Fri Jun 17 2011 Marcela Mašláňová <mmaslano redhat com> - 1.8.4.2-1.2
- Perl mass rebuild
* Fri Jun 10 2011 Marcela Mašláňová <mmaslano redhat com> - 1.8.4.2-1.1
- Perl 5.14 mass rebuild
* Fri Jun  3 2011 Jeffrey C. Ollie <jeff ocjtech us> - 1.8.4.2-1:
-
- The Asterisk Development Team has announced the release of Asterisk
- version 1.8.4.2, which is a security release for Asterisk 1.8.
-
- This release is available for immediate download at
- http://downloads.asterisk.org/pub/telephony/asterisk/releases
-
- The release of Asterisk 1.8.4.2 resolves an issue with SIP URI
- parsing which can lead to a remotely exploitable crash:
-
-    Remote Crash Vulnerability in SIP channel driver (AST-2011-007)
-
- The issue and resolution is described in the AST-2011-007 security
- advisory.
-
- For more information about the details of this vulnerability, please
- read the security advisory AST-2011-007, which was released at the
- same time as this announcement.
-
- For a full list of changes in the current release, please see the ChangeLog:
-
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.4.2
-
- Security advisory AST-2011-007 is available at:
-
- http://downloads.asterisk.org/pub/security/AST-2011-007.pdf
-
- The Asterisk Development Team has announced the release of Asterisk 1.8.4.1.
- This release is available for immediate download at
- http://downloads.asterisk.org/pub/telephony/asterisk/
-
- The release of Asterisk 1.8.4.1 resolves several issues reported by the
- community. Without your help this release would not have been possible.
- Thank you!
-
- Below is a list of issues resolved in this release:
-
-  * Fix our compliance with RFC 3261 section 18.2.2. (aka Cisco phone fix)
-   (Closes issue #18951. Reported by jmls. Patched by wdoekes)
-
-  * Resolve a change in IPv6 header parsing due to the Cisco phone fix issue.
-   This issue was found and reported by the Asterisk test suite.
-   (Closes issue #18951. Patched by mnicholson)
-
-  * Resolve potential crash when using SIP TLS support.
-   (Closes issue #19192. Reported by stknob. Patched by Chainsaw. Tested by
-    vois, Chainsaw)
-
-  * Improve reliability when using SIP TLS.
-   (Closes issue #19182. Reported by st. Patched by mnicholson)
-
-
- For a full list of changes in this release candidate, please see the ChangeLog:
-
- http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.4.1

- The Asterisk Development Team has announced the release of Asterisk 1.8.4. This
- release is available for immediate download at
- http://downloads.asterisk.org/pub/telephony/asterisk/
-
- The release of Asterisk 1.8.4 resolves several issues reported by the community.
- Without your help this release would not have been possible. Thank you!
-
- Below is a sample of the issues resolved in this release:
-
-  * Use SSLv23_client_method instead of old SSLv2 only.
-   (Closes issue #19095, #19138. Reported, patched by tzafrir. Tested by russell
-   and chazzam.
-
-  * Resolve crash in ast_mutex_init()
-   (Patched by twilson)
-
-  * Resolution of several DTMF based attended transfer issues.
-   (Closes issue #17999, #17096, #18395, #17273. Reported by iskatel, gelo,
-   shihchuan, grecco. Patched by rmudgett)
-
-   NOTE: Be sure to read the ChangeLog for more information about these changes.
-
-  * Resolve deadlocks related to device states in chan_sip
-   (Closes issue #18310. Reported, patched by one47. Patched by jpeeler)
-
-  * Resolve an issue with the Asterisk manager interface leaking memory when
-   disabled.
-   (Reported internally by kmorgan. Patched by russellb)
-
-  * Support greetingsfolder as documented in voicemail.conf.sample.
-   (Closes issue #17870. Reported by edhorton. Patched by seanbright)
-
-  * Fix channel redirect out of MeetMe() and other issues with channel softhangup
-   (Closes issue #18585. Reported by oej. Tested by oej, wedhorn, russellb.
-   Patched by russellb)
-
-  * Fix voicemail sequencing for file based storage.
-   (Closes issue #18498, #18486. Reported by JJCinAZ, bluefox. Patched by
-   jpeeler)
-
-  * Set hangup cause in local_hangup so the proper return code of 486 instead of
-   503 when using Local channels when the far sides returns a busy. Also affects
-   CCSS in Asterisk 1.8+.
-   (Patched by twilson)
-
-  * Fix issues with verbose messages not being output to the console.
-   (Closes issue #18580. Reported by pabelanger. Patched by qwell)
-
-  * Fix Deadlock with attended transfer of SIP call
-   (Closes issue #18837. Reported, patched by alecdavis. Tested by
-   alecdavid, Irontec, ZX81, cmaj)
-
- Includes changes per AST-2011-005 and AST-2011-006
- For a full list of changes in this release candidate, please see the ChangeLog:
-
- http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.4
-
- Information about the security releases are available at:
-
- http://downloads.asterisk.org/pub/security/AST-2011-005.pdf
- http://downloads.asterisk.org/pub/security/AST-2011-006.pdf
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #710441 - CVE-2011-2216 Asterisk: Remote DoS (crash) in SIP channel driver (AST-2011-007)
        https://bugzilla.redhat.com/show_bug.cgi?id=710441
--------------------------------------------------------------------------------


================================================================================
 drupal6-6.22-3.el6 (FEDORA-EPEL-2011-3674)
 An open-source content-management platform
--------------------------------------------------------------------------------
Update Information:

Removes spurious dirs in /etc/drupal6 to avoid confusion.
--------------------------------------------------------------------------------
ChangeLog:

* Thu Jun 30 2011 Jon Ciesla <limb jcomserv net> - 6.22-3
- Drop unneeded dirs in /etc/drupal6, BZ 706735.
* Fri Jun 17 2011 Jon Ciesla <limb jcomserv net> - 6.22-2
- Bump and rebuild for BZ 712251.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #706735 - Put modules and themes directories under /etc/drupal6/all/
        https://bugzilla.redhat.com/show_bug.cgi?id=706735
--------------------------------------------------------------------------------


================================================================================
 drupal6-feeds-1.0-0.6.beta11.el6 (FEDORA-EPEL-2011-3684)
 An import and aggregation framework for Drupal
--------------------------------------------------------------------------------
Update Information:

New upstream version.
--------------------------------------------------------------------------------
ChangeLog:

* Thu Jun 30 2011 Peter Borsa <peter borsa gmail com> - 1.0-0.6.beta11
- Fixed release number in the spec file.
* Thu Jun 30 2011 Peter Borsa <peter borsa gmail com> - 1.0-0.1.beta11
- New upstream version.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #717587 - drupal6-feeds-1.0-beta11 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=717587
--------------------------------------------------------------------------------


================================================================================
 drupal7-7.4-1.el6 (FEDORA-EPEL-2011-3672)
 An open-source content-management platform
--------------------------------------------------------------------------------
Update Information:

Remember to log in as user 1 prior to the RPM update, to perform the DB upgrade via http://yoursite/update.php.

  * Advisory ID: DRUPAL-SA-CORE-2011-002
  * Project: Drupal core [1]
  * Version: 7.x
  * Date: 2011-JUNE-29
  * Security risk: Highly critical [2]
  * Exploitable from: Remote
  * Vulnerability: Access bypass

-------- DESCRIPTION  
---------------------------------------------------------

.... Access bypass in node listings

Listings showing nodes but not JOINing the node table show all nodes
regardless of restrictions imposed by the node_access system. In core, this
affects the taxonomy and the forum subsystem.

Note that fixing this issue in contributed modules requires a
backwards-compatible API change for modules listing nodes. See
http://drupal.org/node/1204572 [3] for more details.

This issue affects Drupal 7.x only.

-------- VERSIONS AFFECTED  
---------------------------------------------------

  * Drupal 7.0, 7.1 and 7.2.

-------- SOLUTION  
------------------------------------------------------------

Install the latest version:

  * If you are running Drupal 7.x then upgrade to Drupal 7.3 or 7.4.

The Security Team has released both a pure security update without other bug
fixes and a security update combined with other bug fixes and improvements.
You can choose to either only include the security update for an immediate
fix (which might require less quality assurance and testing) or more fixes
and improvements alongside the security fixes by choosing between Drupal 7.3
and Drupal 7.4. Read the announcement [4] for more information.

See also the Drupal core [5] project page.

-------- REPORTED BY  
---------------------------------------------------------

  * The access bypass was reported independently by numerous people, including
    Sascha Grossenbacher [6], Khaled Alhourani [7], and Ben Ford [8].

-------- FIXED BY  
------------------------------------------------------------

  * The access bypass was fixed by Károly Négyesi [9], member of the Drupal
    security team

-------- CONTACT AND MORE INFORMATION  
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [10].

Learn more about the Drupal Security team and their policies [11], writing
secure code for Drupal [12], and securing your site [13].


[1] http://drupal.org/project/drupal
[2] http://drupal.org/security-team/risk-levels
[3] http://drupal.org/node/1204572
[4] http://drupal.org/drupal-7.4
[5] http://drupal.org/project/drupal
[6] http://drupal.org/user/214652
[7] http://drupal.org/user/265439
[8] http://drupal.org/user/12534
[9] http://drupal.org/user/9446
[10] http://drupal.org/contact
[11] http://drupal.org/security-team
[12] http://drupal.org/writing-secure-code
[13] http://drupal.org/security/secure-configuration


--------------------------------------------------------------------------------
ChangeLog:

* Thu Jun 30 2011 Jon Ciesla <limb jcomserv net> - 7.4-1
- New upstream, SA-CORE-2011-002, BZ 717874.
- Dropped unused dirs in /etc/drupal7/, BZ 703736.
* Fri Jun 17 2011 Jon Ciesla <limb jcomserv net> - 7.2-2
- Bump and rebuild for BZ 712251.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #717874 - Remote access bypass vulnerability in Drupal 7
        https://bugzilla.redhat.com/show_bug.cgi?id=717874
  [ 2 ] Bug #706736 - Put modules and themes directories under /etc/drupal7/all/
        https://bugzilla.redhat.com/show_bug.cgi?id=706736
--------------------------------------------------------------------------------


================================================================================
 naev-0.5.0-3.el6 (FEDORA-EPEL-2011-3673)
 2d action, RPG space game
--------------------------------------------------------------------------------
Update Information:

First release in Fedora package collection.
--------------------------------------------------------------------------------


================================================================================
 naev-data-0.5.0-4.el6 (FEDORA-EPEL-2011-3673)
 Data files for NAEV
--------------------------------------------------------------------------------
Update Information:

First release in Fedora package collection.
--------------------------------------------------------------------------------


================================================================================
 python-taboot-0.3.0-1.el6 (FEDORA-EPEL-2011-3677)
 Client utility for scripted multi-system administration over Func
--------------------------------------------------------------------------------
Update Information:

Fixed #13 - Generate HTML versions of the man pages

Fixed #6, #7, #11, #12 - Updated the Nagios task completely to use the native Func Nagios module

Fixed #17 - sleep.Minutes not printing correct status message

Fixed #20 - Be more helpful when YAML fails to load

Fixed #22 - Taboots not processing YAML files with multiple documents inside

Fixed #15 - Die gracefully when processing bad CLI options
--------------------------------------------------------------------------------
ChangeLog:

* Thu Jun 23 2011 Tim Bielawa <tbielawa redhat com> 0.3.0-1
- Update version. 0.3.0. If Linux can do it -- so can we. (tbielawa redhat com)
- Now included in EPEL and Fedora. Fixes #9 (tbielawa redhat com)
- Correct a lot of spelling errors. Fixes #23 (Taboot maintainer has atrocious
  spelling) (tbielawa redhat com)
- Correctly handle YAML files with multiple YAML documents inside. Fixes #22
  (tbielawa redhat com)
- Better YAML loading debugging. Fixes #20 (tbielawa redhat com)
- Handle bad CLI options gracefully. Fixes #15 (tbielawa redhat com)
- Modify patch from jdetiber. Fixes #17 - sleep.Minutes not printing correct
  status message (tbielawa redhat com)
- Updated output for sleep.Minutes (jason detiberus redhat com)
- Update man page (tbielawa redhat com)
- Update taboot-tasks manpage (tbielawa redhat com)
- Make HOST the default for downtime scheduling again (tbielawa redhat com)
- Updating Nagios task docs (tbielawa redhat com)
- Rewrite the Nagios task to use the new Func Nagios module instead of CURL.
  Fixes #6, #7, #11, #12 (tbielawa redhat com)
- Adding HTML versions of the man pages to the HTML docs. Fixes #13
  (tbielawa redhat com)
--------------------------------------------------------------------------------


================================================================================
 root-5.28.00e-2.el6 (FEDORA-EPEL-2011-3683)
 Numerical data analysis framework
--------------------------------------------------------------------------------
Update Information:

Update of root to version 5.28.00e. For a list of new features and fixed bugs see: http://root.cern.ch/drupal/content/root-version-v5-28-00-patch-release-notes

--------------------------------------------------------------------------------
ChangeLog:

* Wed Jun 29 2011 Mattias Ellert <mattias ellert fysast uu se> - 5.28.00e-2
- Change build requires from qt-devel to qt4-devel
* Wed Jun 29 2011 Mattias Ellert <mattias ellert fysast uu se> - 5.28.00e-1
- Update to 5.28.00e
* Mon Jun 20 2011 ajax redhat com - 5.28.00d-2
- Rebuild for new glew soname
--------------------------------------------------------------------------------


================================================================================
 rubygem-gem2rpm-0.7.1-1.el6 (FEDORA-EPEL-2011-3681)
 Generate rpm specfiles from gems
--------------------------------------------------------------------------------
Update Information:

Updated to the 0.7.1 version.
--------------------------------------------------------------------------------
ChangeLog:

* Thu Jun 30 2011 Vít Ondruch <vondruch redhat com> - 0.7.1-1
- Updated to the 0.7.1 version.
* Wed Feb  9 2011 Fedora Release Engineering <rel-eng lists fedoraproject org> - 0.6.0-6
- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
--------------------------------------------------------------------------------


================================================================================
 swatch-3.2.3-2.el6 (FEDORA-EPEL-2011-3687)
 Tool for actively monitoring log files
--------------------------------------------------------------------------------
Update Information:

The Simple WATCHer is an automated monitoring tool that is capable
of alerting system administrators of anything that matches the
patterns described in the configuration file, whilst constantly
searching logfiles using perl.

--------------------------------------------------------------------------------


================================================================================
 wordpress-3.1.4-1.el6 (FEDORA-EPEL-2011-3682)
 Blog tool and publishing platform
--------------------------------------------------------------------------------
Update Information:

Upstream security release. Details at
http://wordpress.org/news/2011/06/wordpress-3-1-4/
Fix old FSF address and Summary to make rpmlint happy.
Make wp-content directory owned by apache:apache.
Correctly Provides/Obsoletes (with versions).
Upgrade to the latest upstream version (security fixes and enhancements, BZ 707772).
Move wp-content directory to /var/www/wordpress/ (BZ 522897).
Simplify overly detailed files list.
Actually, we just don't need gettext.php at all, it is provided by
php itself. Just remove the file, don't make a symlink.
Revert back to wp-content in /usr/share/wordpress, I am not able to make it
work. Not fixing BZ 522897.
--------------------------------------------------------------------------------
ChangeLog:

* Wed Jun 29 2011 Matěj Cepl <mcepl redhat com> - 3.1.4-1
- New upstream security release.
* Thu Jun  2 2011 Matěj Cepl <mcepl redhat com> - 3.1.3-3
- Actually, we just don't need gettext.php at all, it is provided by
  php itself. Just remove the file, don't make a symlink.
- revert back to wp-content in /usr/share/wordpress, I am not able to make it
  work. Not fixing BZ 522897.
* Wed Jun  1 2011 Matěj Cepl <mcepl redhat com> - 3.1.3-2
- Fix old FSF address and Summary to make rpmlint happy.
- Make wp-content directory owned by apache:apache
- Correctly Provides/Obsoletes (with versions)
* Wed May 25 2011 Matěj Cepl <mcepl redhat com> - 3.1.3-1
- Upgrade to the latest upstream version (security fixes and enhancements, BZ 707772)
- Move wp-content directory to /var/www/wordpress/ (BZ 522897)
- Simplify overly detailed %files
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #707772 - New upstream version 3.1.3 has been released
        https://bugzilla.redhat.com/show_bug.cgi?id=707772
  [ 2 ] Bug #522897 - Unable To Upload Images To /usr/share/wordpress/wp-content/uploads/
        https://bugzilla.redhat.com/show_bug.cgi?id=522897
--------------------------------------------------------------------------------



[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]