Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. https://bugzilla.redhat.com/show_bug.cgi?id=658976 Vincent Danen <vdanen@xxxxxxxxxx> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |vdanen@xxxxxxxxxx Bug 658976 depends on bug 657950, which changed state. Bug 657950 Summary: perl-5.12.2/CGI-3.50 security update https://bugzilla.redhat.com/show_bug.cgi?id=657950 What |Old Value |New Value ---------------------------------------------------------------------------- Status|MODIFIED |ON_QA Status|ON_QA |CLOSED Resolution| |ERRATA --- Comment #3 from Vincent Danen <vdanen@xxxxxxxxxx> 2010-12-07 17:17:01 EST --- This looks to have been assigned CVE-2010-2761: Name: CVE-2010-2761 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2761 Assigned: 20100714 Reference: MLIST:[oss-security] 20101201 CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part) Reference: URL: http://openwall.com/lists/oss-security/2010/12/01/1 Reference: MLIST:[oss-security] 20101201 Re: CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part) Reference: URL: http://openwall.com/lists/oss-security/2010/12/01/3 Reference: MLIST:[oss-security] 20101201 Re: CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part) Reference: URL: http://openwall.com/lists/oss-security/2010/12/01/2 Reference: MISC: https://bugzilla.mozilla.org/show_bug.cgi?id=600464 Reference: CONFIRM: http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes Reference: CONFIRM: http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm Reference: CONFIRM: http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1 Reference: CONFIRM: http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html Reference: CONFIRM: https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380 The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172. -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/perl-devel