https://bugzilla.redhat.com/show_bug.cgi?id=2432107

            Bug ID: 2432107
           Summary: CVE-2026-24049 perl-POE-Wheel-Null: wheel: Privilege
                    Escalation or Arbitrary Code Execution via malicious
                    wheel file unpacking [fedora-43]
           Product: Fedora
           Version: 43
            Status: NEW
        Whiteboard: {"flaws": ["68c36e5e-ac35-42b4-ba4e-ef0edd5b3f06"]}
         Component: perl-POE-Wheel-Null
          Keywords: Security, SecurityTracking
          Severity: high
          Priority: high
          Assignee: [email protected]
          Reporter: [email protected]
        QA Contact: [email protected]
                CC: [email protected], [email protected]
            Blocks: 2431959
  Target Milestone: ---
    Classification: Fedora



Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2432107

Report this comment as SPAM: 
https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-spam&short_desc=Report%20of%20Bug%202432107%23c0

-- 
_______________________________________________
perl-devel mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to