https://bugzilla.redhat.com/show_bug.cgi?id=2269568
Bug ID: 2269568
Summary: CVE-2024-2467 perl-Crypt-OpenSSL-RSA: side-channel
attack in PKCS#1 v1.5 padding mode (Marvin Attack)
[fedora-all]
Product: Fedora
Version: 39
Status: NEW
Component: perl-Crypt-OpenSSL-RSA
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: wjhns174(a)hardakers.net
Reporter: mcascell(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org,
wjhns174(a)hardakers.net
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2269567
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2269568
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=1923909
Bug ID: 1923909
Summary: Upgrade perl-Tree-DAG_Node to 1.32
Product: Fedora
Version: rawhide
Status: NEW
Component: perl-Tree-DAG_Node
Assignee: spotrh(a)gmail.com
Reporter: jplesnik(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: jose.p.oliveira.oss(a)gmail.com, paul(a)city-fan.org,
perl-devel(a)lists.fedoraproject.org, spotrh(a)gmail.com
Target Milestone: ---
Classification: Fedora
Latest Fedora delivers 1.31 version. Upstream released 1.32. When you have free
time, please upgrade it.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2348413
Bug ID: 2348413
Summary: Please branch and build perl-Switch for EPEL 10
Product: Fedora
Version: rawhide
Status: NEW
Component: perl-Switch
Assignee: spotrh(a)gmail.com
Reporter: xavier(a)bachelot.org
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org, spotrh(a)gmail.com
Blocks: 2303880 (EPEL10Tracker)
Target Milestone: ---
Classification: Fedora
Hi,
Could you please branch and build perl-Switch for EPEL 10 ?
I would need it to build another package.
If you don't want or have time to maintain this package in EPEL, I'd be glad
to be added to the package so I can take care of it.
Indeed, I can help with maintainance in Fedora too.
My FAS username is xavierb.
Regards,
Xavier
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=2303880
[Bug 2303880] EPEL 10 Tracker
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2348413
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2035273
Bug ID: 2035273
Summary: CVE-2020-16156 perl-CPAN: allows Signature
Verification Bypass
Product: Security Response
Hardware: All
OS: Linux
Status: NEW
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: mrehak(a)redhat.com
CC: caswilli(a)redhat.com, hhorak(a)redhat.com,
jorton(a)redhat.com, jplesnik(a)redhat.com,
kaycoth(a)redhat.com, mspacek(a)redhat.com,
perl-devel(a)lists.fedoraproject.org,
perl-maint-list(a)redhat.com, ppisar(a)redhat.com
Target Milestone: ---
Classification: Other
It was found that cpan and cpanm are vulnerable to a signature verification
bypass. Additionally, CPAN::Checksums (used by PAUSE) does not uniquely
identify packages in the signed CHECKSUMS file, enabling a supply chain attack.
Reference:
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2035273
https://bugzilla.redhat.com/show_bug.cgi?id=2355244
Bug ID: 2355244
Summary: CVE-2025-27552 perl-DBIx-Class-EncodedColumn:
DBIx::Class::EncodedColumn until 0.00032 for Perl uses
insecure rand() function for salting password hashes
in Crypt/Eksblowfish/Bcrypt.pm [fedora-40]
Product: Fedora
Version: 40
Status: NEW
Whiteboard: {"flaws": ["c7185397-7db4-4534-a645-2ac875052cf1"]}
Component: perl-DBIx-Class-EncodedColumn
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: jplesnik(a)redhat.com
Reporter: ahanwate(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: iarnell(a)gmail.com, jplesnik(a)redhat.com,
perl-devel(a)lists.fedoraproject.org
Blocks: 2355041
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
https://bugzilla.redhat.com/show_bug.cgi?id=2355041
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2355244
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…