The following Fedora 16 Security updates need testing:
 Age  URL
  60  
https://admin.fedoraproject.org/updates/FEDORA-2012-20157/libproxy-0.4.11-1.fc16
   7  https://admin.fedoraproject.org/updates/FEDORA-2013-1748/sssd-1.8.6-1.fc16
   7  
https://admin.fedoraproject.org/updates/FEDORA-2013-1713/libupnp-1.6.18-1.fc16
  59  
https://admin.fedoraproject.org/updates/FEDORA-2012-20236/rssh-2.3.4-1.fc16
 218  
https://admin.fedoraproject.org/updates/FEDORA-2012-10314/revelation-0.4.14-1.fc16
 138  
https://admin.fedoraproject.org/updates/FEDORA-2012-14654/tor-0.2.2.39-1600.fc16
  31  
https://admin.fedoraproject.org/updates/FEDORA-2012-19347/cups-1.5.4-12.fc16
   0  
https://admin.fedoraproject.org/updates/FEDORA-2013-2190/openssh-5.8p2-26.fc16
   7  
https://admin.fedoraproject.org/updates/FEDORA-2013-1716/samba-3.6.12-1.fc16
   0  
https://admin.fedoraproject.org/updates/FEDORA-2013-2201/kernel-3.6.11-7.fc16
   1  https://admin.fedoraproject.org/updates/FEDORA-2013-1991/xen-4.1.4-4.fc16
   7  
https://admin.fedoraproject.org/updates/FEDORA-2013-1735/wordpress-3.5.1-1.fc16
   0  
https://admin.fedoraproject.org/updates/FEDORA-2013-2210/roundcubemail-0.8.5-1.fc16


The following Fedora 16 Critical Path updates have yet to be approved:
 Age URL
   0  
https://admin.fedoraproject.org/updates/FEDORA-2013-2201/kernel-3.6.11-7.fc16
   0  
https://admin.fedoraproject.org/updates/FEDORA-2013-2190/openssh-5.8p2-26.fc16
   1  
https://admin.fedoraproject.org/updates/FEDORA-2013-2011/xulrunner-18.0.2-1.fc16,firefox-18.0.2-1.fc16
   5  
https://admin.fedoraproject.org/updates/FEDORA-2013-1897/phonon-backend-gstreamer-4.6.3-1.fc16
  13  
https://admin.fedoraproject.org/updates/FEDORA-2013-1531/qrencode-3.4.1-1.fc16
 284  
https://admin.fedoraproject.org/updates/FEDORA-2012-6994/upower-0.9.16-1.fc16


The following builds have been pushed to Fedora 16 updates-testing

    abi-compliance-checker-1.98.8-1.fc16
    ffgtk-0.8.5-1.fc16
    kernel-3.6.11-7.fc16
    openssh-5.8p2-26.fc16
    roundcubemail-0.8.5-1.fc16

Details about builds:


================================================================================
 abi-compliance-checker-1.98.8-1.fc16 (FEDORA-2013-2186)
 An ABI Compliance Checker
--------------------------------------------------------------------------------
Update Information:

Update to latest upstream release.
--------------------------------------------------------------------------------
ChangeLog:

* Fri Feb  8 2013 Richard Shaw <hobbes1...@gmail.com> - 1.98.8-1
- Update to latest upstream release.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #909136 - abi-compliance-checker-1.98.8 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=909136
--------------------------------------------------------------------------------


================================================================================
 ffgtk-0.8.5-1.fc16 (FEDORA-2013-2167)
 A solution for controlling Fritz!Box or compatible routers
--------------------------------------------------------------------------------
Update Information:

New upstream release

Add FRITZ!OS 05.50 support
--------------------------------------------------------------------------------
ChangeLog:

* Mon Feb  4 2013 Louis Lagendijk <louis.lagend...@gmail.com> 0.8.5-1
- New upstream release
- Add support for  FRITZ!OS 05.50
* Wed Jan 16 2013 Milan Crha <mc...@redhat.com> - 0.8.4-3
- Rebuild for new evolution-data-server
- Add patch to replace deprecated AM_CONFIG_HEADER with AC_CONFIG_HEADERS
* Fri Dec 21 2012 Louis Lagendijk <louis.lagend...@gmail.com> 0.8.4-2
Rebuild for new libemiscwidgets, libedataserverui libcamel
--------------------------------------------------------------------------------


================================================================================
 kernel-3.6.11-7.fc16 (FEDORA-2013-2201)
 The Linux kernel
--------------------------------------------------------------------------------
Update Information:

- Fix local privilege escalation in MSR code.
- Remove warning about empty IPI mask.

--------------------------------------------------------------------------------
ChangeLog:

* Thu Feb  7 2013 Josh Boyer <jwbo...@redhat.com>
- Fix local privilege escalation in MSR code (rhbz 908693 908706)
* Wed Jan 23 2013 Dave Jones <da...@redhat.com>
- Remove warning about empty IPI mask.
* Wed Jan 16 2013 Justin M. Forbes <jfor...@redhat.com> 3.6.11-6
- Fix resize2fs issue with ext4 (rhbz 852833)
- Fix for CVE-2013-0190 xen corruption with 32bit pvops (rhbz 896051 896038)
* Wed Jan 16 2013 Josh Boyer <jwbo...@redhat.com>
- Add patch from Stanislaw Gruszka to fix iwlegacy IBSS cleanup (rhbz 886946)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #908693 - CVE-2013-0268 kernel: x86/msr: /dev/cpu/*/msr local 
privilege escalation
        https://bugzilla.redhat.com/show_bug.cgi?id=908693
--------------------------------------------------------------------------------


================================================================================
 openssh-5.8p2-26.fc16 (FEDORA-2013-2190)
 An open source implementation of SSH protocol versions 1 and 2
--------------------------------------------------------------------------------
Update Information:

This update changes default of MaxStartups to 10:30:100 to start doing random 
early drop at 10 connections up to 100 connections - CVE-2010-5107
--------------------------------------------------------------------------------
ChangeLog:

* Fri Feb  8 2013 Petr Lautrbach <plaut...@redhat.com> 5.8p2-26 + 0.9.2-31
- change default value of MaxStartups - CVE-2010-5107 (#908707)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #908707 - CVE-2010-5107 openssh: Prevent connection slot exhaustion 
attacks
        https://bugzilla.redhat.com/show_bug.cgi?id=908707
--------------------------------------------------------------------------------


================================================================================
 roundcubemail-0.8.5-1.fc16 (FEDORA-2013-2210)
 Round Cube Webmail is a browser-based multilingual IMAP client
--------------------------------------------------------------------------------
Update Information:

A cross-site scripting (XSS) flaws were round in the way Round Cube Webmail, a 
browser-based multilingual IMAP client, performed sanitization of 'data' and 
'vbscript' URLs. A remote attacker could provide a specially-crafted URL that, 
when opened would lead to arbitrary JavaScript, VisualBasic script or HTML code 
execution in the context of Round Cube Webmail's user session.

Upstream ticket:
[1] http://trac.roundcube.net/ticket/1488850

Further details:
[2] http://trac.roundcube.net/attachment/ticket/1488850/RoundCube2XSS.pdf

Upstream patch:
[3] 
https://github.com/roundcube/roundcubemail/commit/74cd0a9b62f11bc07c5a1d3ba0098b54883eb0ba

References:
[4] http://sourceforge.net/news/?group_id=139281&id=310213
[5] http://www.openwall.com/lists/oss-security/2013/02/07/11
[6] http://www.openwall.com/lists/oss-security/2013/02/08/1
--------------------------------------------------------------------------------
ChangeLog:

* Fri Feb  8 2013 Jon Ciesla <limburg...@gmail.com> - 0.8.5-1
- Latest upstream.
* Mon Nov 19 2012 Jon Ciesla <limburg...@gmail.com> - 0.8.4-1
- Latest upstream.
* Mon Oct 29 2012 Remi Collet <r...@fedoraproject.org> - 0.8.2-3
- fix configuration for httpd 2.4 (#871123)
* Sun Oct 28 2012 Remi Collet <r...@fedoraproject.org> - 0.8.2-2
- add fix for latest MDB2 (#870933)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #909304 - CVE-2012-6121 roundcubemail: Cross-site scripting (XSS) 
in vbscript: and data:text URL handling [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=909304
  [ 2 ] Bug #909306 - CVE-2012-6121 roundcubemail: Cross-site scripting (XSS) 
in vbscript: and data:text URL handling [epel-6]
        https://bugzilla.redhat.com/show_bug.cgi?id=909306
--------------------------------------------------------------------------------

-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

Reply via email to