https://bugzilla.redhat.com/show_bug.cgi?id=1877427
Bug ID: 1877427
Summary: perl-dbi: Risk of memory corruption with many
arguments in DBI method dispatch
Product: Security Response
Hardware: All
OS: Linux
Status: NEW
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: psampaio(a)redhat.com
CC: caillon+fedoraproject(a)gmail.com, hhorak(a)redhat.com,
john.j5live(a)gmail.com, jorton(a)redhat.com,
jplesnik(a)redhat.com, kasal(a)ucw.cz,
perl-devel(a)lists.fedoraproject.org,
perl-maint-list(a)redhat.com, ppisar(a)redhat.com,
rhughes(a)redhat.com, rstrode(a)redhat.com,
sandmann(a)redhat.com
Target Milestone: ---
Classification: Other
A flaw was foundin perl-dbi before version 1.632. Using many arguments to
methods for Callbacks may lead to memory corruption.
Upstream patch:
https://github.com/perl5-dbi/dbi/commit/a8b98e988d6ea2946f5f56691d6d5ead53f…
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1877421
Bug ID: 1877421
Summary: perl-dbi: Old API functions vulnerable to overflow
Product: Security Response
Hardware: All
OS: Linux
Status: NEW
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: psampaio(a)redhat.com
CC: caillon+fedoraproject(a)gmail.com, hhorak(a)redhat.com,
john.j5live(a)gmail.com, jorton(a)redhat.com,
jplesnik(a)redhat.com, kasal(a)ucw.cz,
perl-devel(a)lists.fedoraproject.org,
perl-maint-list(a)redhat.com, ppisar(a)redhat.com,
rhughes(a)redhat.com, rstrode(a)redhat.com,
sandmann(a)redhat.com
Target Milestone: ---
Classification: Other
A flaw was found in perl-dbi before version 1.643. Old API functions might be
vulnerable to overflowing potentially causing memory corruption.
References:
https://github.com/perl5-dbi/dbi/commit/00e2ec459b55b72ee5703c1bd8e6cf57f19…
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1877409
Bug ID: 1877409
Summary: perl-dbi: Buffer overlfow on an overlong DBD class
name
Product: Security Response
Hardware: All
OS: Linux
Status: NEW
Component: vulnerability
Keywords: Security
Severity: low
Priority: low
Assignee: security-response-team(a)redhat.com
Reporter: psampaio(a)redhat.com
CC: caillon+fedoraproject(a)gmail.com, hhorak(a)redhat.com,
john.j5live(a)gmail.com, jorton(a)redhat.com,
jplesnik(a)redhat.com, kasal(a)ucw.cz,
perl-devel(a)lists.fedoraproject.org,
perl-maint-list(a)redhat.com, ppisar(a)redhat.com,
rhughes(a)redhat.com, rstrode(a)redhat.com,
sandmann(a)redhat.com
Target Milestone: ---
Classification: Other
A flaw was found in perl-dbi before version 1.643. A buffer overflow on via an
overlong DBD class name in dbih_setup_handle function may lead to data be
written past the intended limit.
Upstream patch:
https://github.com/perl5-dbi/dbi/commit/36f2a2c5fea36d7d47d6871e42028664346…
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1877405
Bug ID: 1877405
Summary: perl-dbi: NULL profile dereference in dbi_profile()
Product: Security Response
Hardware: All
OS: Linux
Status: NEW
Component: vulnerability
Keywords: Security
Severity: low
Priority: low
Assignee: security-response-team(a)redhat.com
Reporter: psampaio(a)redhat.com
CC: caillon+fedoraproject(a)gmail.com, hhorak(a)redhat.com,
john.j5live(a)gmail.com, jorton(a)redhat.com,
jplesnik(a)redhat.com, kasal(a)ucw.cz,
perl-devel(a)lists.fedoraproject.org,
perl-maint-list(a)redhat.com, ppisar(a)redhat.com,
rhughes(a)redhat.com, rstrode(a)redhat.com,
sandmann(a)redhat.com
Target Milestone: ---
Classification: Other
A flaw was found in perl-dbi. hv_fetch() documentation requires checking for
NULL and the code does that. But then calls SvOK(profile) uncoditionally two
lines later lead to a null profile dereference.
Upstream patch:
https://github.com/perl5-dbi/dbi/commit/eca7d7c8f43d96f6277e86d1000e842eb4c…
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1877402
Bug ID: 1877402
Summary: perl-dbi: Memory corruption in XS functions when Perl
stack is reallocated
Product: Security Response
Hardware: All
OS: Linux
Status: NEW
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: psampaio(a)redhat.com
CC: caillon+fedoraproject(a)gmail.com, hhorak(a)redhat.com,
john.j5live(a)gmail.com, jorton(a)redhat.com,
jplesnik(a)redhat.com, kasal(a)ucw.cz,
perl-devel(a)lists.fedoraproject.org,
perl-maint-list(a)redhat.com, ppisar(a)redhat.com,
rhughes(a)redhat.com, rstrode(a)redhat.com,
sandmann(a)redhat.com
Target Milestone: ---
Classification: Other
A flaw was found in perl-dbi. Macro ST(*) returns pointer to Perl stack. Other
Perl functions which use Perl stack (e.g. eval) may reallocate Perl stack and
therefore pointer returned by ST(*) macro is invalid which may lead to memory
corruption.
Upstream patch:
https://github.com/perl5-dbi/dbi/commit/ea99b6aafb437db53c28fd40d5eafbe119c…
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1917521
Bug ID: 1917521
Summary: Upgrade perl-Calendar-Simple to 2.0.1
Product: Fedora
Version: rawhide
Status: NEW
Component: perl-Calendar-Simple
Assignee: rc040203(a)freenet.de
Reporter: jplesnik(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: lxtnow(a)gmail.com, perl-devel(a)lists.fedoraproject.org,
rc040203(a)freenet.de
Target Milestone: ---
Classification: Fedora
Latest Fedora delivers 2.0.0 version. Upstream released 2.0.1. When you have
free time, please upgrade it.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1829902
Bug ID: 1829902
Summary: Upgrade perl-Algorithm-Dependency to 1.112
Product: Fedora
Version: rawhide
Status: NEW
Component: perl-Algorithm-Dependency
Assignee: rc040203(a)freenet.de
Reporter: jplesnik(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: lkundrak(a)v3.sk, lxtnow(a)gmail.com,
perl-devel(a)lists.fedoraproject.org,
rc040203(a)freenet.de
Target Milestone: ---
Classification: Fedora
Latest Fedora delivers 1.111 version. Upstream released 1.112. When you have
free time, please upgrade it.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1927876
Bug ID: 1927876
Summary: perl-Search-Elasticsearch-7.711 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: perl-Search-Elasticsearch
Keywords: FutureFeature, Triaged
Assignee: emmanuel(a)seyman.fr
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: emmanuel(a)seyman.fr, perl-devel(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
Latest upstream release: 7.711
Current version/release in rawhide: 7.30-2.fc34
URL: http://search.cpan.org/dist/Search-Elasticsearch/
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from anitya:
https://release-monitoring.org/project/10543/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1913148
Bug ID: 1913148
Summary: perl-TAP-Formatter-JUnit-0.12 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: perl-TAP-Formatter-JUnit
Keywords: FutureFeature, Triaged
Assignee: berrange(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
CC: berrange(a)redhat.com,
perl-devel(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
Latest upstream release: 0.12
Current version/release in rawhide: 0.11-17.fc33
URL: http://search.cpan.org/dist/TAP-Formatter-JUnit/
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from anitya:
https://release-monitoring.org/project/3359/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1829990
Bug ID: 1829990
Summary: perl-Test-WWW-Mechanize-PSGI for EL8
Product: Fedora
Version: rawhide
Status: NEW
Component: perl-Test-WWW-Mechanize-PSGI
Assignee: rc040203(a)freenet.de
Reporter: xavier(a)bachelot.org
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org,
rc040203(a)freenet.de
Target Milestone: ---
Classification: Fedora
Hi,
Could you please build perl-Test-WWW-Mechanize-PSGI in EPEL 8 ?
It's in the dependency chain of a package I'd like to build for EPEL 8.
Master branch rebuilds properly against epel 8 target.
Regards,
Xavier
--
You are receiving this mail because:
You are on the CC list for the bug.