https://bugzilla.redhat.com/show_bug.cgi?id=2296986
Bug ID: 2296986
Summary: RPM scriptlet error upgrading to
perl-Mail-SPF-3.20240617-1.fc40.noarch (alternatives)
Product: Fedora
Version: 40
Hardware: x86_64
OS: Linux
Status: NEW
Component: perl-Mail-SPF
Severity: medium
Assignee: jplesnik(a)redhat.com
Reporter: amessina(a)messinet.com
QA Contact: extras-qa(a)fedoraproject.org
CC: jpazdziora(a)redhat.com, jplesnik(a)redhat.com,
perl-devel(a)lists.fedoraproject.org, steve(a)silug.org
Target Milestone: ---
Classification: Fedora
Running scriptlet: perl-Mail-SPF-3.20240617-1.fc40.noarch
failed to link /usr/bin/spfquery -> /etc/alternatives/spf: /usr/bin/spfquery
exists and it is not a symlink
Reproducible: Always
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2296986
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2391834
Bug ID: 2391834
Summary: CVE-2025-40927 perl-CGI-Simple: CGI::Simple versions
1.281 and earlier for Perl has a HTTP response
splitting flaw [fedora-42]
Product: Fedora
Version: 42
Status: NEW
Whiteboard: {"flaws": ["933fd1f2-29f2-4e6e-b879-37c457b28ad7"]}
Component: perl-CGI-Simple
Keywords: Security, SecurityTracking
Assignee: spotrh(a)gmail.com
Reporter: jmoroney(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org, spotrh(a)gmail.com
Blocks: 2391680
Target Milestone: ---
Classification: Fedora
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
The following link provides references to all essential vulnerability
management information. If something is wrong or missing, please contact a
member of PSIRT.
https://spaces.redhat.com/display/PRODSEC/Vulnerability+Management+-+Essent…
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2391834
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2417123
Bug ID: 2417123
Summary: Please branch and build perl-Socket-GetAddrInfo in
epel10
Product: Fedora EPEL
Version: epel10
Status: NEW
Component: perl-Socket-GetAddrInfo
Assignee: emmanuel(a)seyman.fr
Reporter: rbonser(a)umich.edu
QA Contact: extras-qa(a)fedoraproject.org
CC: emmanuel(a)seyman.fr, kwizart(a)gmail.com,
perl-devel(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
Please branch and build perl-Socket-GetAddrInfo in epel10
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2417123
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2030311
Bug ID: 2030311
Summary: Please branch and build perl-Authen-Krb5 in epel9
Product: Fedora EPEL
Version: epel9
Status: NEW
Component: perl-Authen-Krb5
Assignee: simon(a)sxw.org.uk
Reporter: alex.iribarren(a)cern.ch
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org, simon(a)sxw.org.uk
Target Milestone: ---
Classification: Fedora
Description of problem:
Version-Release number of selected component (if applicable):
How reproducible:
Steps to Reproduce:
1.
2.
3.
Actual results:
Expected results:
Additional info:
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2030311
https://bugzilla.redhat.com/show_bug.cgi?id=2355705
Bug ID: 2355705
Summary: CVE-2024-13939 perl-String-Compare-ConstantTime:
String::Compare::ConstantTime for Perl through 0.321
is vulnerable to timing attacks that allow an attacker
to guess the length of a secret string [fedora-41]
Product: Fedora
Version: 41
Status: NEW
Whiteboard: {"flaws": ["da725ec8-9b41-4a44-8936-c21c330ab0cf"]}
Component: perl-String-Compare-ConstantTime
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: ppisar(a)redhat.com
Reporter: ahanwate(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: jplesnik(a)redhat.com,
perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com
Blocks: 2355663
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
https://bugzilla.redhat.com/show_bug.cgi?id=2355663
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2355705
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2369462
Bug ID: 2369462
Summary: CVE-2025-40909 perl: Perl threads have a working
directory race condition where file operations may
target unintended paths [fedora-41]
Product: Fedora
Version: 41
Status: NEW
Whiteboard: {"flaws": ["8b3c517f-748c-46a7-a86f-5a69dd326cf3"]}
Component: perl
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: jplesnik(a)redhat.com
Reporter: mfindra(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: iarnell(a)gmail.com, jplesnik(a)redhat.com, kasal(a)ucw.cz,
mmaslano(a)redhat.com, mspacek(a)redhat.com,
perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com,
psabata(a)redhat.com, rhughes(a)redhat.com,
spotrh(a)gmail.com
Blocks: 2369407 (CVE-2025-40909)
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
https://bugzilla.redhat.com/show_bug.cgi?id=2369407
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=2369407
[Bug 2369407] CVE-2025-40909 perl: Perl threads have a working directory race
condition where file operations may target unintended paths
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2369462
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…