Debian Package Tracker
Register | Log in
Subscribe

libcrypt-dsa-perl

Perl module for DSA Signatures and Key Generation

Choose email to subscribe with

general
  • source: libcrypt-dsa-perl (main)
  • version: 1.20-1
  • maintainer: Debian Perl Group (archive) (DMD) (LowNMU)
  • uploaders: Dominic Hargreaves [DMD]
  • arch: all
  • std-ver: 4.7.4
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.17-4
  • oldstable: 1.17-5
  • stable: 1.19-1
  • testing: 1.19-1
  • unstable: 1.20-1
versioned links
  • 1.17-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.17-5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.19-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.20-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libcrypt-dsa-perl
action needed
2 security issues in forky high

There are 2 open security issues in forky.

2 important issues:
  • CVE-2026-8700: Crypt::DSA versions before 1.20 for Perl generate seeds using rand. Seeds were generated using Perl's built-in rand function, which is predictable and unsuitable for security usage.
  • CVE-2026-8704: Crypt::DSA versions through 1.19 for Perl use 2-args open, allowing existing files to be modified.
Created: 2026-05-16 Last update: 2026-05-18 11:31
2 security issues in bullseye high

There are 2 open security issues in bullseye.

2 important issues:
  • CVE-2026-8700: Crypt::DSA versions before 1.20 for Perl generate seeds using rand. Seeds were generated using Perl's built-in rand function, which is predictable and unsuitable for security usage.
  • CVE-2026-8704: Crypt::DSA versions through 1.19 for Perl use 2-args open, allowing existing files to be modified.
Created: 2026-05-16 Last update: 2026-05-18 11:31
2 low-priority security issues in trixie low

There are 2 open security issues in trixie.

1 issue left for the package maintainer to handle:
  • CVE-2026-8704: (needs triaging) Crypt::DSA versions through 1.19 for Perl use 2-args open, allowing existing files to be modified.

You can find information about how to handle this issue in the security team's documentation.

1 ignored issue:
  • CVE-2026-8700: Crypt::DSA versions before 1.20 for Perl generate seeds using rand. Seeds were generated using Perl's built-in rand function, which is predictable and unsuitable for security usage.
Created: 2026-05-16 Last update: 2026-05-18 11:31
2 low-priority security issues in bookworm low

There are 2 open security issues in bookworm.

1 issue left for the package maintainer to handle:
  • CVE-2026-8704: (needs triaging) Crypt::DSA versions through 1.19 for Perl use 2-args open, allowing existing files to be modified.

You can find information about how to handle this issue in the security team's documentation.

1 ignored issue:
  • CVE-2026-8700: Crypt::DSA versions before 1.20 for Perl generate seeds using rand. Seeds were generated using Perl's built-in rand function, which is predictable and unsuitable for security usage.
Created: 2026-05-16 Last update: 2026-05-18 11:31
testing migrations
  • excuses:
    • Migration status for libcrypt-dsa-perl (1.19-1 to 1.20-1): Waiting for test results or another package, or too young (no action required now - check later)
    • Issues preventing migration:
    • ∙ ∙ Autopkgtest for libcrypt-dsa-perl/1.20-1: amd64: Pass, arm64: Pass, i386: Test triggered, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/libc/libcrypt-dsa-perl.html
    • ∙ ∙ Reproduced on amd64 - info
    • ∙ ∙ Reproduced on arm64 - info
    • ∙ ∙ Reproduced on armhf - info
    • ∙ ∙ Reproduced on i386 - info
    • ∙ ∙ 5 days old (needed 5 days)
    • Not considered
news
[rss feed]
  • [2026-05-16] Accepted libcrypt-dsa-perl 1.20-1 (source) into unstable (gregor herrmann)
  • [2024-12-17] libcrypt-dsa-perl 1.19-1 MIGRATED to testing (Debian testing watch)
  • [2024-12-15] Accepted libcrypt-dsa-perl 1.19-1 (source) into unstable (gregor herrmann)
  • [2022-06-17] libcrypt-dsa-perl 1.17-5 MIGRATED to testing (Debian testing watch)
  • [2022-06-17] libcrypt-dsa-perl 1.17-5 MIGRATED to testing (Debian testing watch)
  • [2022-06-12] Accepted libcrypt-dsa-perl 1.17-5 (source) into unstable (Jelmer Vernooij) (signed by: Jelmer Vernooij)
  • [2015-09-06] libcrypt-dsa-perl 1.17-4 MIGRATED to testing (Britney)
  • [2015-08-31] Accepted libcrypt-dsa-perl 1.17-4 (source) into unstable (Dominic Hargreaves)
  • [2011-10-16] libcrypt-dsa-perl 1.17-3 MIGRATED to testing (Debian testing watch)
  • [2011-10-05] Accepted libcrypt-dsa-perl 1.17-3 (source all) (Harlan Lieberman-Berg) (signed by: gregor herrmann)
  • [2011-10-03] Accepted libcrypt-dsa-perl 1.17-2 (source all) (gregor herrmann)
  • [2011-09-30] Accepted libcrypt-dsa-perl 1.17-1 (source all) (Julián Moreno Patiño) (signed by: gregor herrmann)
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.19-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing