https://bugzilla.redhat.com/show_bug.cgi?id=1482307
Bug ID: 1482307
Summary: perl-Time-HiRes-1.9745 is available
Product: Fedora
Version: rawhide
Component: perl-Time-HiRes
Keywords: FutureFeature, Triaged
Assignee: ppisar(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com
Latest upstream release: 1.9745
Current version/release in rawhide: 1.9744-3.fc27
URL: http://search.cpan.org/dist/Time-HiRes/
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from anitya:
https://release-monitoring.org/project/3466/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1438208
Bug ID: 1438208
Summary: perl-Test-Dir-1.15 is available
Product: Fedora
Version: rawhide
Component: perl-Test-Dir
Keywords: FutureFeature, Triaged
Assignee: ppisar(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com
Latest upstream release: 1.15
Current version/release in rawhide: 1.014-14.fc26
URL: http://search.cpan.org/dist/Test-Dir/
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from anitya:
https://release-monitoring.org/project/3391/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1435489
Bug ID: 1435489
Summary: perl-DateTime-Format-Flexible-0.28 is available
Product: Fedora
Version: rawhide
Component: perl-DateTime-Format-Flexible
Keywords: FutureFeature, Triaged
Assignee: ppisar(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com
Latest upstream release: 0.28
Current version/release in rawhide: 0.27-1.fc27
URL: http://search.cpan.org/dist/DateTime-Format-Flexible/
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from anitya:
https://release-monitoring.org/project/2795/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1397818
Bug ID: 1397818
Summary: perl-BibTeX-Parser-0.70 is available
Product: Fedora
Version: rawhide
Component: perl-BibTeX-Parser
Keywords: FutureFeature, Triaged
Assignee: ppisar(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com
Latest upstream release: 0.70
Current version/release in rawhide: 0.69-1.fc26
URL: http://search.cpan.org/dist/BibTeX-Parser/
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from anitya:
https://release-monitoring.org/project/12090/
--
You are receiving this mail because:
You are on the CC list for the bug.
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
Summary: perl-PAR-Packer-1.013 is available
https://bugzilla.redhat.com/show_bug.cgi?id=796143
Summary: perl-PAR-Packer-1.013 is available
Product: Fedora
Version: rawhide
Platform: Unspecified
OS/Version: Unspecified
Status: NEW
Keywords: FutureFeature, Triaged
Severity: unspecified
Priority: unspecified
Component: perl-PAR-Packer
AssignedTo: mmaslano(a)redhat.com
ReportedBy: upstream-release-monitoring(a)fedoraproject.org
QAContact: extras-qa(a)fedoraproject.org
CC: fedora-perl-devel-list(a)redhat.com,
mmaslano(a)redhat.com, ppisar(a)redhat.com
Classification: Fedora
Story Points: ---
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Latest upstream release: 1.013
Current version in Fedora Rawhide: 1.012
URL: http://search.cpan.org/dist/PAR-Packer/
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
--
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1205913
Bug ID: 1205913
Summary: Please branch perl-Chart for EPEL7
Product: Fedora EPEL
Version: epel7
Component: perl-Chart
Assignee: psabata(a)redhat.com
Reporter: jamielinux(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org,
psabata(a)redhat.com, steve(a)silug.org
It seems to build fine using the f21 srpm. (The rawhide srpm complains that
perl-ExtUtils-MakeMaker is too old.)
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1163295
Bug ID: 1163295
Summary: perl-Sort-Key-1.33 is available
Product: Fedora
Version: rawhide
Component: perl-Sort-Key
Keywords: FutureFeature, Triaged
Assignee: psabata(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: iarnell(a)gmail.com, perl-devel(a)lists.fedoraproject.org,
psabata(a)redhat.com
Latest upstream release: 1.33
Current version/release in Fedora Rawhide: 1.32-7.fc22
URL: http://search.cpan.org/dist/Sort-Key/
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring Soon this service
will be implemented by a new system: https://github.com/fedora-infra/anitya/
It will require to manage monitored projects via a new web interface. Please
make yourself familiar with the new system to ease the transition.
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=ViBSSor8nd&a=cc_unsubscribe
https://bugzilla.redhat.com/show_bug.cgi?id=1336671
Bug ID: 1336671
Summary: CVE-2016-2803 bugzilla: Cross-site-scripting in
dependency graphs
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: anemec(a)redhat.com
CC: bazanluis20(a)gmail.com, emmanuel(a)seyman.fr,
itamar(a)ispbrasil.com.br,
perl-devel(a)lists.fedoraproject.org,
xavier(a)bachelot.org
A vulnerability was found in the bugzilla application. Due to an incorrect
parsing of the image map generated by the dot script, a specially crafted bug
summary could trigger XSS in dependency graphs.
External references:
https://bugzilla.mozilla.org/show_bug.cgi?id=1253263
References:
http://seclists.org/bugtraq/2016/May/72
Upstream fix:
https://git.mozilla.org/?p=bugzilla/bugzilla.git;a=commitdiff;h=dd61903
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1185483
Bug ID: 1185483
Summary: CVE-2014-8630 Bugzilla: Command Injection into product
names and other attributes
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: kseifried(a)redhat.com
CC: bazanluis20(a)gmail.com, emmanuel(a)seyman.fr,
itamar(a)ispbrasil.com.br,
perl-devel(a)lists.fedoraproject.org,
xavier(a)bachelot.org
The Bugzilla project reports:
Class: Command Injection
Versions: All versions before 4.0.16, 4.1.1 to 4.2.11, 4.3.1 to 4.4.6,
4.5.1 to 4.5.6
Fixed In: 4.0.16, 4.2.12, 4.4.7, 5.0rc1
Description: Some code in Bugzilla does not properly utilize 3 arguments form
for open() and it is possible for an account with editcomponents
permissions to inject commands into product names and other
attributes.
References: https://bugzilla.mozilla.org/show_bug.cgi?id=1079065
CVE Number: CVE-2014-8630
External references:
http://www.bugzilla.org/security/4.0.15/
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=wv1CAf1O1K&a=cc_unsubscribe