https://bugzilla.redhat.com/show_bug.cgi?id=2355690
Bug ID: 2355690
Summary: perl-Data-Pond-0.006 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: perl-Data-Pond
Keywords: FutureFeature, Triaged
https://bugzilla.redhat.com/show_bug.cgi?id=2355704
Bug ID: 2355704
Summary: CVE-2024-13939 perl-String-Compare-ConstantTime:
String::Compare::ConstantTime for Perl through 0.321
is vulnerable to timing attacks that allow an attacker
https://bugzilla.redhat.com/show_bug.cgi?id=2355707
Bug ID: 2355707
Summary: CVE-2025-1860 perl-Data-Entropy: Data::Entropy for
Perl uses insecure rand() function for cryptographic
functions [epel-9]
Product: Fedora EPEL
https://bugzilla.redhat.com/show_bug.cgi?id=2355706
Bug ID: 2355706
Summary: CVE-2025-1860 perl-Data-Entropy: Data::Entropy for
Perl uses insecure rand() function for cryptographic
functions [epel-8]
Product: Fedora EPEL
https://bugzilla.redhat.com/show_bug.cgi?id=2355708
Bug ID: 2355708
Summary: CVE-2025-1860 perl-Data-Entropy: Data::Entropy for
Perl uses insecure rand() function for cryptographic
functions [fedora-40]
Product: Fedora
https://bugzilla.redhat.com/show_bug.cgi?id=2355196
Fedora Update System changed:
What|Removed |Added
Status|ASSIGNED|MODIFIED
--- Comment #1 from F
https://bugzilla.redhat.com/show_bug.cgi?id=2355194
Fedora Update System changed:
What|Removed |Added
Resolution|--- |ERRATA
Fixed In Version|
https://bugzilla.redhat.com/show_bug.cgi?id=2354998
--- Comment #7 from Fedora Update System ---
FEDORA-2025-55d5f423c0 has been pushed to the Fedora 40 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --ref
https://bugzilla.redhat.com/show_bug.cgi?id=2355802
Bug ID: 2355802
Summary: perl-Math-BigInt-2.005002 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: perl-Math-BigInt
Keywords: FutureFeature, Triaged
https://bugzilla.redhat.com/show_bug.cgi?id=2354882
Jitka Plesnikova changed:
What|Removed |Added
Status|NEW |ASSIGNED
Summary|perl-DBI
https://bugzilla.redhat.com/show_bug.cgi?id=2355705
Bug ID: 2355705
Summary: CVE-2024-13939 perl-String-Compare-ConstantTime:
String::Compare::ConstantTime for Perl through 0.321
is vulnerable to timing attacks that allow an attacker
https://bugzilla.redhat.com/show_bug.cgi?id=2354998
--- Comment #8 from Fedora Update System ---
FEDORA-2025-fb2014847e has been pushed to the Fedora 41 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --ref
https://bugzilla.redhat.com/show_bug.cgi?id=2353463
Fedora Update System changed:
What|Removed |Added
Fixed In Version|perl-DBIx-Class-Schema-Load |perl-DBIx-Class-Schema-Load
https://bugzilla.redhat.com/show_bug.cgi?id=2354901
--- Comment #4 from Fedora Update System ---
FEDORA-2025-687aedb831 has been pushed to the Fedora 42 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --ref
https://bugzilla.redhat.com/show_bug.cgi?id=2355223
--- Comment #4 from Fedora Update System ---
FEDORA-2025-ccb35f2b79 has been pushed to the Fedora 42 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --ref
https://bugzilla.redhat.com/show_bug.cgi?id=2354998
--- Comment #6 from Fedora Update System ---
FEDORA-2025-db5e9c88b7 has been pushed to the Fedora 42 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --ref
https://bugzilla.redhat.com/show_bug.cgi?id=2355195
Fedora Update System changed:
What|Removed |Added
Status|ASSIGNED|MODIFIED
--- Comment #1 from F
https://bugzilla.redhat.com/show_bug.cgi?id=2355195
Fedora Update System changed:
What|Removed |Added
Resolution|--- |ERRATA
Fixed In Version|
https://bugzilla.redhat.com/show_bug.cgi?id=2355196
Fedora Update System changed:
What|Removed |Added
Status|MODIFIED|CLOSED
Resolution|---
https://bugzilla.redhat.com/show_bug.cgi?id=2355709
Bug ID: 2355709
Summary: CVE-2025-1860 perl-Data-Entropy: Data::Entropy for
Perl uses insecure rand() function for cryptographic
functions [fedora-41]
Product: Fedora
https://bugzilla.redhat.com/show_bug.cgi?id=2355807
Bug ID: 2355807
Summary: perl-Data-Float-0.014 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: perl-Data-Float
Keywords: FutureFeature, Triaged
21 matches
Mail list logo