stable

perl-Module-Signature-0.73-1.el6

FEDORA-EPEL-2013-10392 created by pghmcfc 11 years ago for Fedora EPEL 6

This update ensures that digest modules are only loaded from absolute paths in @INC, avoiding a potential arbitrary code execution problem (CVE-2013-2145).

There are also a variety of internal package clean-ups.

This update has been submitted for testing by pghmcfc.

11 years ago

This update is currently being pushed to the Fedora EPEL 6 testing updates repository.

11 years ago

This update has been pushed to testing

11 years ago

This update has reached 14 days in testing and can be pushed to stable now if the maintainer wishes

11 years ago

This update has been submitted for stable by pghmcfc.

11 years ago

This update is currently being pushed to the Fedora EPEL 6 stable updates repository.

11 years ago

This update has been pushed to stable

11 years ago

Please login to add feedback.

Metadata
Type
security
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
disabled
Stable by Time
disabled
Dates
submitted
11 years ago
in testing
11 years ago
in stable
11 years ago
BZ#971096 CVE-2013-2145 perl-Module-Signature: arbitrary code execution when verifying SIGNATURE
0
0
BZ#971099 CVE-2013-2145 perl-Module-Signature: arbitrary code execution when verifying SIGNATURE [epel-all]
0
0

Automated Test Results