[Bug 1452050] CVE-2016-10374 perltidy: Uses current working directory without symlink-attack protection

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



https://bugzilla.redhat.com/show_bug.cgi?id=1452050



--- Comment #2 from Dhiru Kholia <dkholia@xxxxxxxxxx> ---
Statement:

Red Hat Product Security has rated this issue as having Low security impact.
This issue is not currently planned to be addressed in future updates. For
additional information, refer to the Issue Severity Classification:
https://access.redhat.com/security/updates/classification/ and Red Hat
Enterprise Linux Life Cycle:
https://access.redhat.com/support/policy/updates/errata/.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
perl-devel mailing list -- perl-devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to perl-devel-leave@xxxxxxxxxxxxxxxxxxxxxxx




[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Legacy Announce]     [Fedora PHP Devel]     [Kernel Devel]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Big List of Linux Books]     [Gimp]     [Yosemite Information]
  Powered by Linux