[Bug 962705] CVE-2012-6143 perl-Spoon (Spoon::Cookie): Do not run Storable::thaw() on arbitrary untrusted user input

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



https://bugzilla.redhat.com/show_bug.cgi?id=962705

Ján Rusnačko <jrusnack@xxxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
         Whiteboard|impact=moderate,public=2013 |impact=moderate,public=2013
                   |0512,reported=20130512,sour |0512,reported=20130512,sour
                   |ce=osssecurity,cvss2=5.0/AV |ce=oss-security,cvss2=5.0/A
                   |:N/AC:L/Au:N/C:N/I:P/A:N,fe |V:N/AC:L/Au:N/C:N/I:P/A:N,f
                   |dora-all/perl-Spoon=affecte |edora-all/perl-Spoon=affect
                   |d,epel-6/perl-Spoon=affecte |ed,epel-6/perl-Spoon=affect
                   |d                           |ed



-- 
You are receiving this mail because:
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/perl-devel




[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Legacy Announce]     [Fedora PHP Devel]     [Kernel Devel]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Big List of Linux Books]     [Gimp]     [Yosemite Information]
  Powered by Linux