https://bugzilla.redhat.com/show_bug.cgi?id=2296986
Bug ID: 2296986
Summary: RPM scriptlet error upgrading to
perl-Mail-SPF-3.20240617-1.fc40.noarch (alternatives)
Product: Fedora
Version: 40
Hardware: x86_64
OS: Linux
Status: NEW
Component: perl-Mail-SPF
Severity: medium
Assignee: jplesnik(a)redhat.com
Reporter: amessina(a)messinet.com
QA Contact: extras-qa(a)fedoraproject.org
CC: jpazdziora(a)redhat.com, jplesnik(a)redhat.com,
perl-devel(a)lists.fedoraproject.org, steve(a)silug.org
Target Milestone: ---
Classification: Fedora
Running scriptlet: perl-Mail-SPF-3.20240617-1.fc40.noarch
failed to link /usr/bin/spfquery -> /etc/alternatives/spf: /usr/bin/spfquery
exists and it is not a symlink
Reproducible: Always
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2296986
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2359474
Bug ID: 2359474
Summary: CVE-2024-56406 perl: Perl 5.34, 5.36, 5.38 and 5.40
are vulnerable to a heap buffer overflow when
transliterating non-ASCII bytes [fedora-40]
Product: Fedora
Version: 40
Status: NEW
Whiteboard: {"flaws": ["12140f73-491d-4dd0-b75f-9d17e314f0c6"]}
Component: perl
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: jplesnik(a)redhat.com
Reporter: mfindra(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: iarnell(a)gmail.com, jplesnik(a)redhat.com, kasal(a)ucw.cz,
mmaslano(a)redhat.com, mspacek(a)redhat.com,
perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com,
psabata(a)redhat.com, rhughes(a)redhat.com,
spotrh(a)gmail.com
Blocks: 2359290
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
https://bugzilla.redhat.com/show_bug.cgi?id=2359290
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2359474
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…