[Bug 2032857] please branch and build perl-Module-Install-CheckLib for EPEL-9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2032857



--- Comment #3 from Fedora Update System  ---
FEDORA-EPEL-2021-1b91dd50ff has been submitted as an update to Fedora EPEL 9.
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-1b91dd50ff


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2032857
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2034013] Please branch and build perl-Test-Without-Module for EPEL-9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2034013



--- Comment #4 from Paul Howarth  ---
The NEVR of this build appears to clash with a build in the rhel-base repo,
which is confusing koji.
A workaround that seems to work is to bump and rebuild the EPEL 9 package.
See https://pagure.io/releng/issue/10472

Could you please bump and rebuild perl-Test-Without-Module for EPEL-9?


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2034013
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2033569] Please branch and build perl-Test-FailWarnings for EPEL-9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2033569



--- Comment #4 from Paul Howarth  ---
The NEVR of this build appears to clash with a build in the rhel-base repo,
which is confusing koji.
A workaround that seems to work is to bump and rebuild the EPEL 9 package.
See https://pagure.io/releng/issue/10472

Could you please bump and rebuild perl-Test-FailWarnings for EPEL-9?


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2033569
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2032799] perl-Crypt-DH for EPEL 9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2032799

Fedora Update System  changed:

   What|Removed |Added

 Status|ASSIGNED|MODIFIED



--- Comment #2 from Fedora Update System  ---
FEDORA-EPEL-2021-6505a76dbf has been submitted as an update to Fedora EPEL 9.
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-6505a76dbf


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2032799
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2007259] perl-IO-Socket-SSL-2.072-2.fc36 FTBFS: read tests fail (with openssl1.1-1.1.1l?)

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2007259

Paul Howarth  changed:

   What|Removed |Added

 Resolution|--- |RAWHIDE
   Fixed In Version||perl-IO-Socket-SSL-2.073-1.
   ||fc36
 Status|NEW |CLOSED
Last Closed||2021-12-23 11:25:32



--- Comment #3 from Paul Howarth  ---
Fixed with new upstream release 2.073.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2007259
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2035273] New: CVE-2020-16156 perl-CPAN: allows Signature Verification Bypass

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2035273

Bug ID: 2035273
   Summary: CVE-2020-16156 perl-CPAN: allows Signature
Verification Bypass
   Product: Security Response
  Hardware: All
OS: Linux
Status: NEW
 Component: vulnerability
  Keywords: Security
  Severity: medium
  Priority: medium
  Assignee: security-response-t...@redhat.com
  Reporter: mre...@redhat.com
CC: caswi...@redhat.com, hho...@redhat.com,
jor...@redhat.com, jples...@redhat.com,
kayc...@redhat.com, mspa...@redhat.com,
perl-devel@lists.fedoraproject.org,
perl-maint-l...@redhat.com, ppi...@redhat.com
  Target Milestone: ---
Classification: Other



It was found that cpan and cpanm are vulnerable to a signature verification
bypass. Additionally, CPAN::Checksums (used by PAUSE) does not uniquely
identify packages in the signed CHECKSUMS file, enabling a supply chain attack.

Reference:

https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2035273
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2035274] CVE-2020-16156 perl-CPAN: allows Signature Verification Bypass [fedora-all]

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2035274



--- Comment #1 from Marian Rehak  ---
Use the following template to for the 'fedpkg update' request to submit an
update for this issue as it contains the top-level parent bug(s) as well as
this tracking bug.  This will ensure that all associated bugs get updated
when new packages are pushed to stable.

=

# bugfix, security, enhancement, newpackage (required)
type=security

# low, medium, high, urgent (required)
severity=medium

# testing, stable
request=testing

# Bug numbers: 1234,9876
bugs=2035273,2035274

# Description of your update
notes=Security fix for [PUT CVEs HERE]

# Enable request automation based on the stable/unstable karma thresholds
autokarma=True
stable_karma=3
unstable_karma=-3

# Automatically close bugs when this marked as stable
close_bugs=True

# Suggest that users restart after update
suggest_reboot=False

==

Additionally, you may opt to use the bodhi web interface to submit updates:

https://bodhi.fedoraproject.org/updates/new


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2035274
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2035273] CVE-2020-16156 perl-CPAN: allows Signature Verification Bypass

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2035273



--- Comment #1 from Marian Rehak  ---
Created perl-CPAN tracking bugs for this issue:

Affects: fedora-all [bug 2035274]


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2035273
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2035274] New: CVE-2020-16156 perl-CPAN: allows Signature Verification Bypass [fedora-all]

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2035274

Bug ID: 2035274
   Summary: CVE-2020-16156 perl-CPAN: allows Signature
Verification Bypass [fedora-all]
   Product: Fedora
   Version: 35
Status: NEW
 Component: perl-CPAN
  Keywords: Security, SecurityTracking
  Severity: medium
  Priority: medium
  Assignee: jples...@redhat.com
  Reporter: mre...@redhat.com
QA Contact: extras...@fedoraproject.org
CC: jples...@redhat.com, mspa...@redhat.com,
perl-devel@lists.fedoraproject.org, ppi...@redhat.com
  Target Milestone: ---
Classification: Fedora




This is an automatically created tracking bug!  It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of fedora-all.

For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.

For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs

When submitting as an update, use the fedpkg template provided in the next
comment(s).  This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.

Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.

NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time.  If you need to fix the versions independent of each other,
you may clone this bug as appropriate.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2035274
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2035274] CVE-2020-16156 perl-CPAN: allows Signature Verification Bypass [fedora-all]

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2035274

Marian Rehak  changed:

   What|Removed |Added

 Blocks||2035273 (CVE-2020-16156)





Referenced Bugs:

https://bugzilla.redhat.com/show_bug.cgi?id=2035273
[Bug 2035273] CVE-2020-16156 perl-CPAN: allows Signature Verification Bypass
-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2035274
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2035273] CVE-2020-16156 perl-CPAN: allows Signature Verification Bypass

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2035273

Marian Rehak  changed:

   What|Removed |Added

 Depends On||2035274





Referenced Bugs:

https://bugzilla.redhat.com/show_bug.cgi?id=2035274
[Bug 2035274] CVE-2020-16156 perl-CPAN: allows Signature Verification Bypass
[fedora-all]
-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2035273
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2035273] CVE-2020-16156 perl-CPAN: allows Signature Verification Bypass

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2035273

Marian Rehak  changed:

   What|Removed |Added

 Blocks||2035276




-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2035273
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2033349] perl-Test-Modern for EPEL 9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2033349

Paul Howarth  changed:

   What|Removed |Added

 Depends On||2032425, 2031806
   Doc Type|--- |If docs needed, set a value





Referenced Bugs:

https://bugzilla.redhat.com/show_bug.cgi?id=2031806
[Bug 2031806] perl-Mouse for EPEL 9
https://bugzilla.redhat.com/show_bug.cgi?id=2032425
[Bug 2032425] perl-Moose for EPEL 9
-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2033349
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2032425] perl-Moose for EPEL 9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2032425

Paul Howarth  changed:

   What|Removed |Added

 Blocks||2033349





Referenced Bugs:

https://bugzilla.redhat.com/show_bug.cgi?id=2033349
[Bug 2033349] perl-Test-Modern for EPEL 9
-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2032425
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2031806] perl-Mouse for EPEL 9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2031806

Paul Howarth  changed:

   What|Removed |Added

 Blocks||2033349





Referenced Bugs:

https://bugzilla.redhat.com/show_bug.cgi?id=2033349
[Bug 2033349] perl-Test-Modern for EPEL 9
-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2031806
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2033196] Please branch and build perl-Task-Weaken for EPEL-9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2033196

Paul Howarth  changed:

   What|Removed |Added

   Doc Type|--- |If docs needed, set a value



--- Comment #1 from Paul Howarth  ---
Will you be able to branch and build perl-Task-Weaken in epel9?
I would be happy to be a co-maintainer if you do not wish
to build it on epel9.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2033196
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2035341] New: CVE-2020-16154 perl-App-cpanminus: signature verification bypass

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2035341

Bug ID: 2035341
   Summary: CVE-2020-16154 perl-App-cpanminus: signature
verification bypass
   Product: Security Response
  Hardware: All
OS: Linux
Status: NEW
 Component: vulnerability
  Keywords: Security
  Severity: medium
  Priority: medium
  Assignee: security-response-t...@redhat.com
  Reporter: mre...@redhat.com
CC: hho...@redhat.com, jor...@redhat.com,
jples...@redhat.com, mmasl...@redhat.com,
mspa...@redhat.com,
perl-devel@lists.fedoraproject.org,
perl-maint-l...@redhat.com
  Target Milestone: ---
Classification: Other



An attacker can prepend checksums for modified packages to the beginning of
CHECKSUMS files, before the cleartext PGP headers. This makes the
Module::Signature::_verify() checks in both cpan and cpanm pass.

External Reference:

https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2035341
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2035341] CVE-2020-16154 perl-App-cpanminus: signature verification bypass

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2035341

Marian Rehak  changed:

   What|Removed |Added

 Blocks||2035343



--- Comment #1 from Marian Rehak  ---
Created perl-App-cpanminus tracking bugs for this issue:

Affects: fedora-all [bug 2035342]


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2035341
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2035342] New: CVE-2020-16154 perl-App-cpanminus: signature verification bypass [fedora-all]

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2035342

Bug ID: 2035342
   Summary: CVE-2020-16154 perl-App-cpanminus: signature
verification bypass [fedora-all]
   Product: Fedora
   Version: 35
Status: NEW
 Component: perl-App-cpanminus
  Keywords: Security, SecurityTracking
  Severity: medium
  Priority: medium
  Assignee: jples...@redhat.com
  Reporter: mre...@redhat.com
QA Contact: extras...@fedoraproject.org
CC: jples...@redhat.com, mmasl...@redhat.com,
mspa...@redhat.com, perl-devel@lists.fedoraproject.org
  Target Milestone: ---
Classification: Fedora




This is an automatically created tracking bug!  It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of fedora-all.

For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.

For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs

When submitting as an update, use the fedpkg template provided in the next
comment(s).  This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.

Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.

NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time.  If you need to fix the versions independent of each other,
you may clone this bug as appropriate.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2035342
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2035342] CVE-2020-16154 perl-App-cpanminus: signature verification bypass [fedora-all]

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2035342



--- Comment #1 from Marian Rehak  ---
Use the following template to for the 'fedpkg update' request to submit an
update for this issue as it contains the top-level parent bug(s) as well as
this tracking bug.  This will ensure that all associated bugs get updated
when new packages are pushed to stable.

=

# bugfix, security, enhancement, newpackage (required)
type=security

# low, medium, high, urgent (required)
severity=medium

# testing, stable
request=testing

# Bug numbers: 1234,9876
bugs=2035341,2035342

# Description of your update
notes=Security fix for [PUT CVEs HERE]

# Enable request automation based on the stable/unstable karma thresholds
autokarma=True
stable_karma=3
unstable_karma=-3

# Automatically close bugs when this marked as stable
close_bugs=True

# Suggest that users restart after update
suggest_reboot=False

==

Additionally, you may opt to use the bodhi web interface to submit updates:

https://bodhi.fedoraproject.org/updates/new


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2035342
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2035341] CVE-2020-16154 perl-App-cpanminus: signature verification bypass

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2035341

Marian Rehak  changed:

   What|Removed |Added

 Depends On||2035342





Referenced Bugs:

https://bugzilla.redhat.com/show_bug.cgi?id=2035342
[Bug 2035342] CVE-2020-16154 perl-App-cpanminus: signature verification bypass
[fedora-all]
-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2035341
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2035342] CVE-2020-16154 perl-App-cpanminus: signature verification bypass [fedora-all]

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2035342

Marian Rehak  changed:

   What|Removed |Added

 Blocks||2035341 (CVE-2020-16154)





Referenced Bugs:

https://bugzilla.redhat.com/show_bug.cgi?id=2035341
[Bug 2035341] CVE-2020-16154 perl-App-cpanminus: signature verification bypass
-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2035342
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2034401] perl-IPC-SharedCache for EPEL 9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2034401

Fedora Update System  changed:

   What|Removed |Added

 Status|NEW |MODIFIED



--- Comment #1 from Fedora Update System  ---
FEDORA-EPEL-2021-c11dbfdc69 has been submitted as an update to Fedora EPEL 9.
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-c11dbfdc69


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2034401
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2035430] New: perl-DateTime-1.55 is available

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2035430

Bug ID: 2035430
   Summary: perl-DateTime-1.55 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-DateTime
  Keywords: FutureFeature, Triaged
  Assignee: p...@city-fan.org
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: iarn...@gmail.com, p...@city-fan.org,
perl-devel@lists.fedoraproject.org, st...@silug.org
  Target Milestone: ---
Classification: Fedora



Latest upstream release: 1.55
Current version/release in rawhide: 1.54-6.fc35
URL: http://search.cpan.org/dist/DateTime/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from Anitya:
https://release-monitoring.org/project/2787/


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2035430
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2035430] perl-DateTime-1.55 is available

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2035430



--- Comment #1 from Upstream Release Monitoring 
 ---
Scratch build failed. Details bellow:

GenericError: File upload failed:
cli-build/1640306810.368616.wAAQZuQE/perl-DateTime-1.55-1.fc34.src.rpm
Traceback:
  File
"/usr/local/lib/python3.9/site-packages/hotness/use_cases/package_scratch_build_use_case.py",
line 56, in build
result = self.builder.build(request.package, request.opts)
  File "/usr/local/lib/python3.9/site-packages/hotness/builders/koji.py", line
198, in build
output["build_id"] = self._scratch_build(session, package.name, srpm)
  File "/usr/local/lib/python3.9/site-packages/hotness/builders/koji.py", line
451, in _scratch_build
session.uploadWrapper(source, serverdir)
  File "/usr/lib/python3.9/site-packages/koji/__init__.py", line 3000, in
uploadWrapper
self.fastUpload(localfile, path, name, callback, blocksize, overwrite,
volume=volume)
  File "/usr/lib/python3.9/site-packages/koji/__init__.py", line 2935, in
fastUpload
raise GenericError("File upload failed: %s/%s" % (path, name))

If you think this issue is caused by some bug in the-new-hotness, please report
it on the-new-hotness issue tracker:
https://github.com/fedora-infra/the-new-hotness/issues


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2035430
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2031754] perl-Authen-PAM for EPEL 9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2031754

Fedora Update System  changed:

   What|Removed |Added

 Resolution|--- |ERRATA
   Fixed In Version||perl-Authen-PAM-0.16-44.el9
 Status|ON_QA   |CLOSED
Last Closed||2021-12-24 01:06:54



--- Comment #4 from Fedora Update System  ---
FEDORA-EPEL-2021-8643de577a has been pushed to the Fedora EPEL 9 stable
repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2031754
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2032209] Branch and build perl-Crypt-Cracklib in epel9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2032209

Fedora Update System  changed:

   What|Removed |Added

   Fixed In Version||perl-Crypt-Cracklib-1.7-29.
   ||el9
 Resolution|--- |ERRATA
 Status|ON_QA   |CLOSED
Last Closed||2021-12-24 01:06:56



--- Comment #4 from Fedora Update System  ---
FEDORA-EPEL-2021-6adbee71a8 has been pushed to the Fedora EPEL 9 stable
repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2032209
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2032511] Please branch and build perl-Modern-Perl in epel9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2032511

Fedora Update System  changed:

   What|Removed |Added

 Status|ON_QA   |CLOSED
   Fixed In Version||perl-Modern-Perl-1.20200211
   ||-1.el9
 Resolution|--- |ERRATA
Last Closed||2021-12-24 01:07:00



--- Comment #4 from Fedora Update System  ---
FEDORA-EPEL-2021-b2a51a5cf3 has been pushed to the Fedora EPEL 9 stable
repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2032511
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2032232] perl-Crypt-DH-GMP for EPEL 9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2032232
Bug 2032232 depends on bug 2032261, which changed state.

Bug 2032261 Summary: perl-Math-BigInt-GMP for EPEL 9
https://bugzilla.redhat.com/show_bug.cgi?id=2032261

   What|Removed |Added

 Status|ON_QA   |CLOSED
 Resolution|--- |ERRATA




-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2032232
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2032261] perl-Math-BigInt-GMP for EPEL 9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2032261

Fedora Update System  changed:

   What|Removed |Added

 Status|ON_QA   |CLOSED
   Fixed In Version||perl-Math-BigInt-GMP-1.6007
   ||-1.el9
 Resolution|--- |ERRATA
Last Closed||2021-12-24 01:07:02



--- Comment #4 from Fedora Update System  ---
FEDORA-EPEL-2021-b675a4c0f6 has been pushed to the Fedora EPEL 9 stable
repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2032261
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2031862] Please branch and build perl-Test-File-Contents for EPEL 9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2031862

Fedora Update System  changed:

   What|Removed |Added

 Resolution|--- |ERRATA
   Fixed In Version||perl-Test-File-Contents-0.2
   ||3-17.el9
 Status|ON_QA   |CLOSED
Last Closed||2021-12-24 01:07:08



--- Comment #4 from Fedora Update System  ---
FEDORA-EPEL-2021-bd33056b63 has been pushed to the Fedora EPEL 9 stable
repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2031862
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2032450] perl-Test-LWP-UserAgent for EPEL 9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2032450
Bug 2032450 depends on bug 2032872, which changed state.

Bug 2032872 Summary: perl-Safe-Isa for EPEL 9
https://bugzilla.redhat.com/show_bug.cgi?id=2032872

   What|Removed |Added

 Status|ON_QA   |CLOSED
 Resolution|--- |ERRATA




-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2032450
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2032104] perl-IO-Pipely-0.006 is available

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2032104

Fedora Update System  changed:

   What|Removed |Added

   Fixed In Version||perl-IO-Pipely-0.006-1.el9
 Status|ON_QA   |CLOSED
 Resolution|--- |ERRATA
Last Closed||2021-12-24 01:07:46



--- Comment #5 from Fedora Update System  ---
FEDORA-EPEL-2021-00578b3c2c has been pushed to the Fedora EPEL 9 stable
repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2032104
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2031539] Please branch and build perl-Log-Dispatch in epel9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2031539
Bug 2031539 depends on bug 2031541, which changed state.

Bug 2031541 Summary: Please branch and build perl-Mail-Sendmail in epel9
https://bugzilla.redhat.com/show_bug.cgi?id=2031541

   What|Removed |Added

 Status|ON_QA   |CLOSED
 Resolution|--- |ERRATA




-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2031539
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2031814] perl-Regexp-Assemble for EPEL 9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2031814
Bug 2031814 depends on bug 2031862, which changed state.

Bug 2031862 Summary: Please branch and build perl-Test-File-Contents for EPEL 9
https://bugzilla.redhat.com/show_bug.cgi?id=2031862

   What|Removed |Added

 Status|ON_QA   |CLOSED
 Resolution|--- |ERRATA




-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2031814
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2031819] perl-Test-Output for EPEL 9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2031819

Fedora Update System  changed:

   What|Removed |Added

   Fixed In Version||perl-Test-Output-1.03.3-3.e
   ||l9
 Status|ON_QA   |CLOSED
 Resolution|--- |ERRATA
Last Closed||2021-12-24 01:07:10



--- Comment #4 from Fedora Update System  ---
FEDORA-EPEL-2021-f429da3989 has been pushed to the Fedora EPEL 9 stable
repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2031819
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2032425] perl-Moose for EPEL 9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2032425
Bug 2032425 depends on bug 2031819, which changed state.

Bug 2031819 Summary: perl-Test-Output for EPEL 9
https://bugzilla.redhat.com/show_bug.cgi?id=2031819

   What|Removed |Added

 Status|ON_QA   |CLOSED
 Resolution|--- |ERRATA




-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2032425
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2031079] perl-Crypt-DES for EPEL 9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2031079

Fedora Update System  changed:

   What|Removed |Added

 Resolution|--- |ERRATA
 Status|ON_QA   |CLOSED
   Fixed In Version||perl-Crypt-DES-2.07-24.el9
Last Closed||2021-12-24 01:07:37



--- Comment #5 from Fedora Update System  ---
FEDORA-EPEL-2021-b25c48e97c has been pushed to the Fedora EPEL 9 stable
repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2031079
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2032872] perl-Safe-Isa for EPEL 9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2032872

Fedora Update System  changed:

   What|Removed |Added

 Status|ON_QA   |CLOSED
   Fixed In Version||perl-Safe-Isa-1.10-1.el
   ||9
 Resolution|--- |ERRATA
Last Closed||2021-12-24 01:07:39



--- Comment #4 from Fedora Update System  ---
FEDORA-EPEL-2021-2453e1c489 has been pushed to the Fedora EPEL 9 stable
repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2032872
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2032104] perl-IO-Pipely-0.006 is available

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2032104

Fedora Update System  changed:

   What|Removed |Added

   Fixed In Version|perl-IO-Pipely-0.006-1.el9  |perl-IO-Pipely-0.006-1.el9
   ||perl-IO-Pipely-0.006-1.fc35



--- Comment #6 from Fedora Update System  ---
FEDORA-2021-3018d9bda1 has been pushed to the Fedora 35 stable repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2032104
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2032799] perl-Crypt-DH for EPEL 9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2032799

Fedora Update System  changed:

   What|Removed |Added

 Status|MODIFIED|ON_QA



--- Comment #3 from Fedora Update System  ---
FEDORA-EPEL-2021-6505a76dbf has been pushed to the Fedora EPEL 9 testing
repository.

You can provide feedback for this update here:
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-6505a76dbf

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information
on how to test updates.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2032799
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2034401] perl-IPC-SharedCache for EPEL 9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2034401

Fedora Update System  changed:

   What|Removed |Added

 Status|MODIFIED|ON_QA



--- Comment #2 from Fedora Update System  ---
FEDORA-EPEL-2021-c11dbfdc69 has been pushed to the Fedora EPEL 9 testing
repository.

You can provide feedback for this update here:
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-c11dbfdc69

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information
on how to test updates.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2034401
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2031541] Please branch and build perl-Mail-Sendmail in epel9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2031541

Fedora Update System  changed:

   What|Removed |Added

   Fixed In Version||perl-Mail-Sendmail-0.80-13.
   ||el9
 Status|ON_QA   |CLOSED
 Resolution|--- |ERRATA
Last Closed||2021-12-24 01:07:31



--- Comment #3 from Fedora Update System  ---
FEDORA-EPEL-2021-9c6e0d2580 has been pushed to the Fedora EPEL 9 stable
repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2031541
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2032857] please branch and build perl-Module-Install-CheckLib for EPEL-9

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2032857

Fedora Update System  changed:

   What|Removed |Added

 Status|MODIFIED|ON_QA



--- Comment #4 from Fedora Update System  ---
FEDORA-EPEL-2021-1b91dd50ff has been pushed to the Fedora EPEL 9 testing
repository.

You can provide feedback for this update here:
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-1b91dd50ff

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information
on how to test updates.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2032857
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure