[Bug 967697] New: provides false perl(B::Uitls)
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=967697
Bug ID: 967697
Summary: provides false perl(B::Uitls)
Product: Fedora
Version: rawhide
Component: perl-Module-Info
Severity: unspecified
Priority: unspecified
Assignee: steve(a)silug.org
Reporter: robinlee.sysu(a)gmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org, steve(a)silug.org
Description of problem:
This package include /usr/share/perl5/vendor_perl/B/BUtils.pm. But it doesn't
follow common Perl practice. The packege this module file provdies is
'B::Utils' instead of 'B::BUtils'. Though B/BUtils.pm is a fork of B::Utils.
Then RPM's which requires perl(B::Utils) will break. Since yum/rpm may consider
perl-Module-Info could fulfill the dependency. Program that 'use B::Utils'
cannot find B/Utils.pm in perl-Module-Info.
Consider filter the perl(B::Utils) provides. Or link B/Utils.pm to B/BUtils.pm
and make it conflict perl-B-Utils
Version-Release number of selected component (if applicable):
perl-Module-Info-0.32-6.fc18.noarch
How reproducible:
perl -mB::Utils
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=W02G4kB8T1&a=cc_unsubscribe
9 years, 6 months
[Bug 751887] New: CVE-2011-4115 perl-Parallel-ForkManager: insecure temporary file usage [fedora-all]
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
Summary: CVE-2011-4115 perl-Parallel-ForkManager: insecure temporary file usage [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=751887
Summary: CVE-2011-4115 perl-Parallel-ForkManager: insecure
temporary file usage [fedora-all]
Product: Fedora
Version: 15
Platform: All
OS/Version: Linux
Status: NEW
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Component: perl-Parallel-ForkManager
AssignedTo: tibbs(a)math.uh.edu
ReportedBy: vdanen(a)redhat.com
QAContact: extras-qa(a)fedoraproject.org
CC: tibbs(a)math.uh.edu, fedora-perl-devel-list(a)redhat.com
Blocks: 751886
Classification: Fedora
Story Points: ---
Type: ---
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected Fedora
versions.
For comments that are specific to the vulnerability please use bugs filed
against "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When creating a Bodhi update request, please include this bug ID and the
bug IDs of this bug's parent bugs filed against the "Security Response"
product (the top-level CVE bugs). Please mention the CVE IDs being fixed
in the RPM changelog when available.
Bodhi update submission link:
https://admin.fedoraproject.org/updates/new/?type_=security&bugs=751886
Please note: this issue affects multiple supported versions of Fedora.
Only one tracking bug has been filed; please ensure that it is only closed
when all affected versions are fixed.
[bug automatically created by: add-tracking-bugs]
--
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
9 years, 6 months
[Bug 962708] New: CVE-2012-6143 perl-Spoon (Spoon::Cookie): Do not run Storable::thaw() on arbitrary untrusted user input [epel-6]
by Red Hat Bugzilla
Product: Fedora EPEL
https://bugzilla.redhat.com/show_bug.cgi?id=962708
Bug ID: 962708
Summary: CVE-2012-6143 perl-Spoon (Spoon::Cookie): Do not run
Storable::thaw() on arbitrary untrusted user input
[epel-6]
Product: Fedora EPEL
Version: el6
Component: perl-Spoon
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: steve(a)silug.org
Reporter: jlieskov(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org, steve(a)silug.org
Blocks: 962705 (CVE-2012-6143)
Category: ---
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora EPEL.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When creating a Bodhi update request, please use the bodhi submission link
noted in the next comment(s). This will include the bug IDs of this
tracking bug as well as the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
Bodhi notes field when available.
epel-6 tracking bug for perl-Spoon: see blocks bug list for full details of the
security issue(s).
[bug automatically created by: add-tracking-bugs]
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=OAeSnqF8OC&a=cc_unsubscribe
9 years, 7 months
[Bug 1110725] New: CVE-2014-0477 perl-Email-Address: Denial-of-Service in Email::Address::parse [epel-5]
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1110725
Bug ID: 1110725
Summary: CVE-2014-0477 perl-Email-Address: Denial-of-Service in
Email::Address::parse [epel-5]
Product: Fedora EPEL
Version: el5
Component: perl-Email-Address
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Assignee: rob.myers(a)gtri.gatech.edu
Reporter: vkaigoro(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org,
rob.myers(a)gtri.gatech.edu
Blocks: 1110723 (CVE-2014-0477)
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora EPEL.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When creating a Bodhi update request, use the bodhi submission link noted
in the next comment(s). This will include the bug IDs of this tracking
bug as well as the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
Bodhi notes field when available.
epel-5 tracking bug for perl-Email-Address: see blocks bug list for full
details of the security issue(s).
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1110723
[Bug 1110723] CVE-2014-0477 perl-Email-Address: Denial-of-Service in
Email::Address::parse
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=NhD9tnOLrD&a=cc_unsubscribe
9 years, 7 months
[Bug 1110726] New: CVE-2014-0477 perl-Email-Address: Denial-of-Service in Email::Address::parse [epel-6]
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1110726
Bug ID: 1110726
Summary: CVE-2014-0477 perl-Email-Address: Denial-of-Service in
Email::Address::parse [epel-6]
Product: Fedora EPEL
Version: el6
Component: perl-Email-Address
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Assignee: rob.myers(a)gtri.gatech.edu
Reporter: vkaigoro(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org,
rob.myers(a)gtri.gatech.edu
Blocks: 1110723 (CVE-2014-0477)
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora EPEL.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When creating a Bodhi update request, use the bodhi submission link noted
in the next comment(s). This will include the bug IDs of this tracking
bug as well as the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
Bodhi notes field when available.
epel-6 tracking bug for perl-Email-Address: see blocks bug list for full
details of the security issue(s).
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1110723
[Bug 1110723] CVE-2014-0477 perl-Email-Address: Denial-of-Service in
Email::Address::parse
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=nH9a5NmShV&a=cc_unsubscribe
9 years, 7 months