This update ensures that digest modules are only loaded from absolute paths in @INC, avoiding a potential arbitrary code execution problem (CVE-2013-2145).

There are also a variety of internal package clean-ups.

This update has been submitted for testing by pghmcfc.

9 years ago

This update is currently being pushed to the Fedora EPEL 6 testing updates repository.

9 years ago

This update has been pushed to testing

9 years ago

This update has reached 14 days in testing and can be pushed to stable now if the maintainer wishes

9 years ago

This update has been submitted for stable by pghmcfc.

9 years ago

This update is currently being pushed to the Fedora EPEL 6 stable updates repository.

9 years ago

This update has been pushed to stable

9 years ago

Please login to add feedback.

Metadata
Type
security
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
disabled
Stable by Time
disabled
Dates
submitted
9 years ago
in testing
9 years ago
in stable
9 years ago
BZ#971096 CVE-2013-2145 perl-Module-Signature: arbitrary code execution when verifying SIGNATURE
0
0
BZ#971099 CVE-2013-2145 perl-Module-Signature: arbitrary code execution when verifying SIGNATURE [epel-all]
0
0

Automated Test Results