Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. Summary: perl-CGI-Simple: CRLF injection vulnerability via a crafted URL [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=658973 Summary: perl-CGI-Simple: CRLF injection vulnerability via a crafted URL [fedora-all] Product: Fedora Version: 14 Platform: All OS/Version: Linux Status: NEW Keywords: Security, SecurityTracking Severity: medium Priority: medium Component: perl-CGI-Simple AssignedTo: tcallawa@xxxxxxxxxx ReportedBy: jlieskov@xxxxxxxxxx QAContact: extras-qa@xxxxxxxxxxxxxxxxx CC: tcallawa@xxxxxxxxxx, fedora-perl-devel-list@xxxxxxxxxx Blocks: 658970 Classification: Fedora Target Release: --- This is an automatically created tracking bug! It was created to ensure that one or more security vulnerabilities are fixed in affected Fedora versions. For comments that are specific to the vulnerability please use bugs filed against "Security Response" product referenced in the "Blocks" field. For more information see: http://fedoraproject.org/wiki/Security/TrackingBugs When creating a Bodhi update request, please include the bug IDs of the respective parent bugs filed against the "Security Response" product. Please mention CVE ids in the RPM changelog when available. Bodhi update submission link: https://admin.fedoraproject.org/updates/new/?type_=security&bugs=658970 Please note: this issue affects multiple supported versions of Fedora. Only one tracking bug has been filed; please only close it when all affected versions are fixed. [bug automatically created by: add-tracking-bugs] -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/perl-devel