[Bug 2035274] CVE-2020-16156 perl-CPAN: allows Signature Verification Bypass [fedora-all]

2022-01-03 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2035274 --- Comment #5 from Fedora Update System --- FEDORA-2022-21e8372c42 has been pushed to the Fedora 35 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing

[Bug 2035274] CVE-2020-16156 perl-CPAN: allows Signature Verification Bypass [fedora-all]

2022-01-03 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2035274 Fedora Update System changed: What|Removed |Added Status|MODIFIED|ON_QA --- Comment #4 from

[Bug 2035274] CVE-2020-16156 perl-CPAN: allows Signature Verification Bypass [fedora-all]

2022-01-03 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2035274 --- Comment #3 from Fedora Update System --- FEDORA-2022-84fd87f7eb has been submitted as an update to Fedora 34. https://bodhi.fedoraproject.org/updates/FEDORA-2022-84fd87f7eb -- You are receiving this mail because: You are on the CC list

[Bug 2035274] CVE-2020-16156 perl-CPAN: allows Signature Verification Bypass [fedora-all]

2022-01-03 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2035274 Fedora Update System changed: What|Removed |Added Status|NEW |MODIFIED --- Comment #2 from

[Bug 2035274] CVE-2020-16156 perl-CPAN: allows Signature Verification Bypass [fedora-all]

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2035274 Marian Rehak changed: What|Removed |Added Blocks||2035273 (CVE-2020-16156) Referenced

[Bug 2035274] CVE-2020-16156 perl-CPAN: allows Signature Verification Bypass [fedora-all]

2021-12-23 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2035274 --- Comment #1 from Marian Rehak --- Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure that all