Packages
Get Gentoo!
gentoo.org sites
gentoo.org
Wiki
Bugs
Forums
Packages
Planet
Archives
Sources
Infra Status
Home
Packages
Maintainers
USE flags
Architectures
About
Gentoo Project
Perl Project
Packages
1841
Outdated
166
Pull requests
3
Bugs
297
Security
21
Changelog
Security Bug Reports
dev-perl/DBI: insufficient parameter validation in DBD::File (CVE-2014-10402)
746437 - Assigned to Gentoo Security
<dev-perl/Net-CIDR-Lite-0.220.0: octal type confusion with leading zeros in IP octets
779172 - Assigned to Gentoo Security
dev-perl/App-cpanminus: signature verification bypass
829116 - Assigned to Gentoo Security
<dev-perl/HTTP-Daemon-6.160.0: Incorrect handling of multiple Content-Length headers
908905 - Assigned to Gentoo Security
dev-perl/Mail-Box-POP3: defaults to no SSL verification
913199 - Assigned to Gentoo Security
<dev-perl/Crypt-SMIME-0.300.0: double free in x509 parser
930378 - Assigned to Gentoo Security
<dev-perl/Email-MIME-1.954.0: Denial of service via excessive memory consumption
931106 - Assigned to Gentoo Security
<dev-perl/Net-DNS-1.450.0: DoS vulnerability in TCP handling
931107 - Assigned to Gentoo Security
<dev-perl/Crypt-OpenSSL-RSA-0.350.0: Marvin Attack vulnerability (side-channel)
931108 - Assigned to Gentoo Security
<dev-perl/Module-ScanDeps-1.370.0: Local privilege escalation
945087 - Assigned to Gentoo Security
<dev-perl/YAML-LibYAML-0.903.0: Unsafe open use
949498 - Assigned to Gentoo Security
<dev-lang/perl-5.40.2: Heap buffer overflow
953821 - Assigned to Gentoo Security
<dev-lang/perl-5.42.0: Perl threads have a working directory race condition where file operations may target unintended path
956993 - Assigned to Gentoo Security
<dev-perl/File-Find-Rule-0.350.0: Arbitrary Code Execution when grep() encounters a crafted file name
957182 - Assigned to Gentoo Security
<dev-perl/CryptX-87.0: Vulnerability in bundled dev-libs/libtommath
958034 - Assigned to Gentoo Security
<dev-perl/Authen-SASL-2.180.0-r1: insufficient entropy in client nonce
960293 - Assigned to Gentoo Security
<dev-perl/Crypt-CBC-3.70.0: May use insecure rand() function for cryptographic functions
960822 - Assigned to Gentoo Security
<dev-perl/JSON-XS-4.40.0: integer overflow
962549 - Assigned to Gentoo Security
<dev-perl/Cpanel-JSON-XS-4.400.0: integer overflow
962550 - Assigned to Gentoo Security
<dev-perl/CGI-Simple-1.282.0: missing sanitization of user-supplied values in HTTP headers
962681 - Assigned to Gentoo Security
Contact Information
Please file new vulnerability reports on
Gentoo Bugzilla
and assign them to the Gentoo Security product and Vulnerabilities component.