Fedora 20: echoping Security Update

    Date 10 Apr 2015
    Posted By LinuxSecurity Advisories
    Updated to latest SVN, fixing various bugs
    Fedora Update Notification
    2015-02-26 02:34:10
    Name        : echoping
    Product     : Fedora 20
    Version     : 6.1
    Release     : 0.beta.r434svn.1.fc20
    URL         : https://echoping.sourceforge.net/
    Summary     : TCP performance test to measure response time of network hosts
    Description :
    Echoping is a small program to test (approximate) performances of a
    remote host by sending TCP "echo" (or other protocol, such as HTTP)
    Update Information:
    Updated to latest SVN, fixing various bugs
    * Wed Feb 25 2015 Andreas Thienemann  - 6.1-0.beta.r434svn.1
    - Updated to latest SVN, fixing #705174 and #1007031
    - Removed so versioning and fixed module loading, fixing #460557 and #1032547
    * Sat Aug 16 2014 Fedora Release Engineering  - 6.0.2-13
    - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
    * Sat Jun  7 2014 Fedora Release Engineering  - 6.0.2-12
    - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
      [ 1 ] Bug #705174 - echoping: boundary error in SSL-related functions can lead to buffer overflow [fedora-all]
      [ 2 ] Bug #1007031 - echoping segfaults all the time
      [ 3 ] Bug #460557 - echoping : Package and software are in a desolate state
      [ 4 ] Bug #1032547 - echoping doesn't seem to work (cannot open shared object file)
    This update can be installed with the "yum" update program.  Use
    su -c 'yum update echoping' at the command line.
    For more information, refer to "Managing Software with yum",
    available at https://docs.fedoraproject.org/yum/.
    All packages are signed with the Fedora Project GPG key.  More details on the
    GPG keys used by the Fedora Project can be found at
    package-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    If you are using full-disk encryption: are you concerned about the resulting performance hit?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    [{"id":"120","title":"Yes","votes":"13","type":"x","order":"1","pct":59.09,"resources":[]},{"id":"121","title":"No ","votes":"9","type":"x","order":"2","pct":40.91,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200


    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.