https://bugzilla.redhat.com/show_bug.cgi?id=1230613
Bug ID: 1230613
Summary: Upgrade perl-IO-Any to 0.09
Product: Fedora
Version: rawhide
Component: perl-IO-Any
Keywords: FutureFeature
Assignee: r.landmann(a)redhat.com
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org,
r.landmann(a)redhat.com
Latest Fedora delivers perl-IO-Any 0.04. Upstream released 0.09. Please
upgrade.
Also please enable monitoring service to receive reports about new releases.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1230637
Bug ID: 1230637
Summary: Upgrade perl-Locale-Maketext-Gettext to 1.28
Product: Fedora
Version: rawhide
Component: perl-Locale-Maketext-Gettext
Keywords: FutureFeature
Assignee: r.landmann(a)redhat.com
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org,
r.landmann(a)redhat.com
Latest Fedora delivers perl-Locale-Maketext-Gettext 1.27. Upstream released
1.28. Please upgrade.
Also please enable monitoring service to receive reports about new releases.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1230806
Bug ID: 1230806
Summary: Upgrade perl-Shipwright to 2.4.41
Product: Fedora
Version: rawhide
Component: perl-Set-Object
Keywords: FutureFeature
Assignee: kraxel(a)redhat.com
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: kraxel(a)redhat.com, perl-devel(a)lists.fedoraproject.org
Latest Fedora delivers 2.4.33. Upstream released 2.4.41. Please upgrade.
Also please enable monitoring service to receive reports about new releases.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1231099
Bug ID: 1231099
Summary: Upgrade perl-XML-TreePP to 0.43
Product: Fedora
Version: rawhide
Component: perl-XML-TreePP
Keywords: FutureFeature
Assignee: vanmeeuwen+fedora(a)kolabsys.com
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: marianne(a)tuxette.fr,
perl-devel(a)lists.fedoraproject.org,
vanmeeuwen+fedora(a)kolabsys.com
Latest Fedora delivers perl-XML-TreePP 0.39. Upstream released 0.43. Please
upgrade.
Also please enable monitoring service to receive reports about new releases.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1231090
Bug ID: 1231090
Summary: Upgrade perl-XML-FeedPP to 0.43
Product: Fedora
Version: rawhide
Component: perl-XML-FeedPP
Keywords: FutureFeature
Assignee: vanmeeuwen+fedora(a)kolabsys.com
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org,
vanmeeuwen+fedora(a)kolabsys.com
Latest Fedora delivers perl-XML-FeedPP 0.41. Upstream released 0.43. Please
upgrade.
Also please enable monitoring service to receive reports about new releases.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1214706
Bug ID: 1214706
Summary: perl-Dancer-1.3135 is available
Product: Fedora
Version: rawhide
Component: perl-Dancer
Keywords: FutureFeature, Triaged
Assignee: jplesnik(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: jplesnik(a)redhat.com,
perl-devel(a)lists.fedoraproject.org
Latest upstream release: 1.3135
Current version/release in rawhide: 1.3134-1.fc23
URL: http://search.cpan.org/dist/Dancer/
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1230053
Bug ID: 1230053
Summary: Upgrade perl-Barcode-Code128 to 2.21
Product: Fedora
Version: rawhide
Component: perl-Barcode-Code128
Keywords: FutureFeature
Assignee: vanoudt(a)gmail.com
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org, vanoudt(a)gmail.com
Latest Fedora delivers perl-Barcode-Code128 2.01. Upstream released 2.21.
Please upgrade.
Also please enable monitoring service to receive reports about new releases.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1230047
Bug ID: 1230047
Summary: Upgrade perl-Authen-CAS-Client to 0.07
Product: Fedora
Version: rawhide
Component: perl-Authen-CAS-Client
Keywords: FutureFeature
Assignee: vanoudt(a)gmail.com
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org, vanoudt(a)gmail.com
Latest Fedora delivers perl-Authen-CAS-Client 0.06. Upstream released 0.07.
Please upgrade.
Also please enable monitoring service to get automated reports about new
releases.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1209918
Bug ID: 1209918
Summary: perl-Module-Signature: arbitrary modules loading in
some circumstances
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: vkaigoro(a)redhat.com
CC: paul(a)city-fan.org, perl-devel(a)lists.fedoraproject.org,
perl-maint-list(a)redhat.com, pertusus(a)free.fr
Module::Signature before version 0.75 has been loading several modules at
runtime inside the extracted module directory. Modules like Text::Diff are not
guaranteed to be available on all platforms and could be added to a malicious
module so that they would load from the '.' path in @INC.
Upstream fix:
https://github.com/audreyt/module-signature/commit/c41e8885b862b9fce2719449…
CVE request: http://seclists.org/oss-sec/2015/q2/59
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1209915
Bug ID: 1209915
Summary: perl-Module-Signature: arbitrary code execution during
test phase
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: vkaigoro(a)redhat.com
CC: paul(a)city-fan.org, perl-devel(a)lists.fedoraproject.org,
perl-maint-list(a)redhat.com, pertusus(a)free.fr
When verifying the contents of a CPAN module, Module::Signature before version
0.75 ignored some files in the extracted tarball that were not listed in the
signature file. This included some files in the t/ directory that would execute
automatically during "make test".
Upstream fix:
https://github.com/audreyt/module-signature/commit/8a9164596fa5952d4fbcde5a…
CVE request: http://seclists.org/oss-sec/2015/q2/59
--
You are receiving this mail because:
You are on the CC list for the bug.