Packages
Get Gentoo!
gentoo.org sites
gentoo.org
Wiki
Bugs
Forums
Packages
Planet
Archives
Sources
Infra Status
Home
Packages
Maintainers
USE flags
Architectures
About
Gentoo Project
Perl Project
Packages
1840
Stabilization
0
Outdated
138
Pull requests
4
Bugs
308
Security
22
Changelog
Security Bug Reports
<dev-perl/Crypt-DSA-1.190.0: Insecure random number generation (CVE-2011-3599)
386595 - Assigned to Gentoo Security
dev-perl/DBI: insufficient parameter validation in DBD::File (CVE-2014-10402)
746437 - Assigned to Gentoo Security
<dev-perl/Net-CIDR-Lite-0.220.0: octal type confusion with leading zeros in IP octets
779172 - Assigned to Gentoo Security
dev-perl/App-cpanminus: signature verification bypass
829116 - Assigned to Gentoo Security
<dev-perl/HTTP-Daemon-6.160.0: Incorrect handling of multiple Content-Length headers
908905 - Assigned to Gentoo Security
dev-perl/Mail-Box-POP3: defaults to no SSL verification
913199 - Assigned to Gentoo Security
<dev-perl/Crypt-SMIME-0.300.0: double free in x509 parser
930378 - Assigned to Gentoo Security
<dev-perl/Email-MIME-1.954.0: Denial of service via excessive memory consumption
931106 - Assigned to Gentoo Security
<dev-perl/Net-DNS-1.450.0: DoS vulnerability in TCP handling
931107 - Assigned to Gentoo Security
<dev-perl/Crypt-OpenSSL-RSA-0.350.0: Marvin Attack vulnerability (side-channel)
931108 - Assigned to Gentoo Security
<dev-perl/Module-ScanDeps-1.370.0: Local privilege escalation
945087 - Assigned to Gentoo Security
<dev-perl/YAML-LibYAML-0.903.0: Unsafe open use
949498 - Assigned to Gentoo Security
<dev-lang/perl-5.40.2: Heap buffer overflow
953821 - Assigned to Gentoo Security
<dev-lang/perl-5.42.0: Perl threads have a working directory race condition where file operations may target unintended path
956993 - Assigned to Gentoo Security
<dev-perl/File-Find-Rule-0.350.0: Arbitrary Code Execution when grep() encounters a crafted file name
957182 - Assigned to Gentoo Security
<dev-perl/CryptX-87.0: Vulnerability in bundled dev-libs/libtommath
958034 - Assigned to Gentoo Security
<dev-perl/Authen-SASL-2.180.0-r1: insufficient entropy in client nonce
960293 - Assigned to Gentoo Security
<dev-perl/Crypt-CBC-3.70.0: May use insecure rand() function for cryptographic functions
960822 - Assigned to Gentoo Security
<dev-perl/JSON-XS-4.40.0: integer overflow
962549 - Assigned to Gentoo Security
<dev-perl/Cpanel-JSON-XS-4.400.0: integer overflow
962550 - Assigned to Gentoo Security
<dev-perl/CGI-Simple-1.282.0: missing sanitization of user-supplied values in HTTP headers
962681 - Assigned to Gentoo Security
Contact Information
Please file new vulnerability reports on
Gentoo Bugzilla
and assign them to the Gentoo Security product and Vulnerabilities component.