https://bugzilla.redhat.com/show_bug.cgi?id=1456770
Bug ID: 1456770
Summary: CVE-2017-0373 perl-Config-Model: gen_class_pod
implementation has dangerous "use lib" line
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: amaris(a)redhat.com
CC: david.hannequin(a)gmail.com,
perl-devel(a)lists.fedoraproject.org
The gen_class_pod implementation in lib/Config/Model/Utils/GenClassPod.pm in
Config-Model (aka libconfig-model-perl) before 2.102 has a dangerous "use lib"
line, which allows remote attackers to have an unspecified impact via a crafted
Debian package file.
Debian patch:
https://anonscm.debian.org/cgit/pkg-perl/packages/libconfig-model-perl.git/…
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1329059
Bug ID: 1329059
Summary: Don't produce terminal control sequences in perldoc
Product: Fedora
Version: rawhide
Component: perl-Pod-Perldoc
Keywords: FutureFeature, Reopened
Assignee: ppisar(a)redhat.com
Reporter: praiskup(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: extras-qa(a)fedoraproject.org, hhorak(a)redhat.com,
jmlich83(a)gmail.com, mmaslano(a)redhat.com,
perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com,
ToddAndMargo(a)zoho.com
Depends On: 1258741
+++ This bug was initially created as a clone of Bug #1258741 +++
Short summary, command 'PAGER=less perldoc perlreref' behaves oddly.
The issue is that perldoc *always* produces some terminal (color?) sequences,
and less (by default) is careful to escape terminal sequences rather then
printing them in a raw form.
This bug is here to ask whether it is possible (or makes sense) to not produce
terminal sequences in perldoc output. Or simply request for brainstorm.
See the original bug report for more info.
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1258741
[Bug 1258741] "PAGER=less perldoc perlreref" escapes color sequences, drop
them or interpret them
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1376845
Bug ID: 1376845
Summary: The license tag should mention GPL+ or Artistic
Product: Fedora
Version: rawhide
Component: perl-Params-Validate
Assignee: rc040203(a)freenet.de
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: lxtnow(a)gmail.com, perl-devel(a)lists.fedoraproject.org,
rc040203(a)freenet.de
Params-Validate-1.24/c/ppport.h contains license declaration:
This program is free software; you can redistribute it and/or
modify it under the same terms as Perl itself.
The file is included into compilation unit when compiling
lib/Params/Validate/XS.c into XS.so. Thus I think the spec file should mention
"GPL+ or Artistic" in the License tag. Now it declares "Artistic 2.0" only.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1406558
Bug ID: 1406558
Summary: build for EPEL7
Product: Fedora EPEL
Version: epel7
Component: perl-Coro
Assignee: emmanuel(a)seyman.fr
Reporter: carl.george(a)rackspace.com
QA Contact: extras-qa(a)fedoraproject.org
CC: emmanuel(a)seyman.fr, perl-devel(a)lists.fedoraproject.org
I'm a co-maintainer of uwsgi in Fedora and EPEL. Uwsgi has a subpackage for a
coroae plugin, but it is disabled on EPEL7 because it needs this package.
Please consider adding an EPEL7 branch for perl-Coro so that I can enable the
uwsgi-plugin-coroae subpackage for EPEL7.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1467606
Bug ID: 1467606
Summary: CVE-2017-10789 perl-DBD-MySQL: Possible MITM attack
when mysql_ssl=1
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: amaris(a)redhat.com
CC: hhorak(a)redhat.com, jorton(a)redhat.com,
jplesnik(a)redhat.com,
perl-devel(a)lists.fedoraproject.org,
perl-maint-list(a)redhat.com, ppisar(a)redhat.com,
psabata(a)redhat.com
The DBD::mysql module through 4.043 for Perl uses the mysql_ssl=1 setting to
mean that SSL is optional (even though this setting's documentation has a "your
communication with the server will be encrypted" statement), which allows
man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack,
a related issue to CVE-2015-3152.
Upstream bug:
https://github.com/perl5-dbi/DBD-mysql/issues/140
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1467600
Bug ID: 1467600
Summary: CVE-2017-10788 perl-DBD-MySQL: Use-after-free when
calling mysql_stmt_error() after mysql_stmt_close()
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: amaris(a)redhat.com
CC: hhorak(a)redhat.com, jorton(a)redhat.com,
jplesnik(a)redhat.com,
perl-devel(a)lists.fedoraproject.org,
perl-maint-list(a)redhat.com, ppisar(a)redhat.com,
psabata(a)redhat.com
The DBD::mysql module through 4.043 for Perl allows remote attackers to cause a
denial of service (use-after-free and application crash) or possibly have
unspecified other impact by triggering (1) certain error responses from a MySQL
server or (2) a loss of a network connection to a MySQL server. The
use-after-free defect was introduced by relying on incorrect Oracle
mysql_stmt_close documentation and code examples.
Upstream bug:
https://github.com/perl5-dbi/DBD-mysql/issues/120
References:
http://seclists.org/oss-sec/2017/q2/443
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1467608
Bug ID: 1467608
Summary: CVE-2017-10788 CVE-2017-10789 perl-DBD-MySQL: various
flaws [fedora-all]
Product: Fedora
Version: 25
Component: perl-DBD-MySQL
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: jplesnik(a)redhat.com
Reporter: amaris(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: jplesnik(a)redhat.com,
perl-devel(a)lists.fedoraproject.org
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of fedora-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1529797
Bug ID: 1529797
Summary: fusioninventory-agent-2.4 is available
Product: Fedora
Version: rawhide
Component: fusioninventory-agent
Keywords: FutureFeature, Triaged
Assignee: marianne(a)tuxette.fr
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: johan(a)x-tnd.be, marianne(a)tuxette.fr,
perl-devel(a)lists.fedoraproject.org
Latest upstream release: 2.4
Current version/release in rawhide: 2.3.21-3.fc28
URL: http://www.fusioninventory.org/
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from anitya:
https://release-monitoring.org/project/5671/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1537217
Bug ID: 1537217
Summary: perl-gettext: Obsoletes work by package name, not by
provides
Product: Fedora
Version: rawhide
Component: perl-gettext
Assignee: rc040203(a)freenet.de
Reporter: ignatenko(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: dan(a)danny.cz, lxtnow(a)gmail.com,
perl-devel(a)lists.fedoraproject.org,
rc040203(a)freenet.de
Your package has Obsoletes:...%{_isa} or some form of it. It never worked
because obsoleting work by package names and not by provides. You need either
to remove it or fix it.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1526063
Bug ID: 1526063
Summary: perl stops working after upgrade F26 -> F27
Product: Fedora
Version: 27
Component: perl
Severity: urgent
Assignee: jplesnik(a)redhat.com
Reporter: mutiny.mutiny(a)rediffmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: alexl(a)redhat.com, caillon+fedoraproject(a)gmail.com,
iarnell(a)gmail.com, jplesnik(a)redhat.com, kasal(a)ucw.cz,
mbarnes(a)fastmail.com, mmaslano(a)redhat.com,
perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com,
psabata(a)redhat.com, rhughes(a)redhat.com,
sandmann(a)redhat.com, tcallawa(a)redhat.com
Description of problem:
I can'r run my perl scripts because of module errors. To solve them I tried to
re-run my perl cpan script - which fails.
Version-Release number of selected component (if applicable):
perl5 (revision 5 version 26 subversion 1)
How reproducible:
Invoking cpan
Steps to Reproduce:
1.
Invoking cpan via command line
2.
result:
3.
Actual results:
Attempt to reload Scalar/Util.pm aborted.
Compilation failed in require at /usr/share/perl5/Safe.pm line 4.
BEGIN failed--compilation aborted at /usr/share/perl5/Safe.pm line 4.
Compilation failed in require at /usr/share/perl5/vendor_perl/CPAN.pm line 57.
BEGIN failed--compilation aborted at /usr/share/perl5/vendor_perl/CPAN.pm line
57.
Compilation failed in require at /usr/share/perl5/vendor_perl/App/Cpan.pm line
288.
BEGIN failed--compilation aborted at /usr/share/perl5/vendor_perl/App/Cpan.pm
line 288.
Compilation failed in require at /usr/bin/cpan line 7.
BEGIN failed--compilation aborted at /usr/bin/cpan line 7.
Expected results:
no error message.
Additional info:
invokib cowsay causes:
Can't load '/usr/local/lib64/perl5/auto/Encode/Encode.so' for module Encode:
libperl.so.5.24: cannot open shared object file: No such file or directory at
/usr/share/perl5/XSLoader.pm line 96.
at /usr/local/lib64/perl5/Encode.pm line 10.
Compilation failed in require at /usr/bin/cowsay line 18.
--
You are receiving this mail because:
You are on the CC list for the bug.