Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. https://bugzilla.redhat.com/show_bug.cgi?id=658976 Vincent Danen <vdanen@xxxxxxxxxx> changed: What |Removed |Added ---------------------------------------------------------------------------- Summary|CVE-2010-2761 perl-CGI: |CVE-2010-2761 CVE-2010-4410 |CRLF injection | perl-CGI: multiple |vulnerability via a crafted |vulnerabilites via a |URL |crafted URL Alias| |CVE-2010-4410 --- Comment #4 from Vincent Danen <vdanen@xxxxxxxxxx> 2010-12-07 17:26:40 EST --- Ahhh... MITRE has this broken down as two issues, the second of which is here: Name: CVE-2010-4410 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4410 Assigned: 20101206 Reference: MLIST:[oss-security] 20101201 CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part) Reference: URL: http://openwall.com/lists/oss-security/2010/12/01/1 Reference: MLIST:[oss-security] 20101201 Re: CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part) Reference: URL: http://openwall.com/lists/oss-security/2010/12/01/3 Reference: MLIST:[oss-security] 20101201 Re: CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part) Reference: URL: http://openwall.com/lists/oss-security/2010/12/01/2 Reference: CONFIRM: http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes Reference: CONFIRM: http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm Reference: CONFIRM: http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1 Reference: CONFIRM: http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html Reference: BID:45145 Reference: URL: http://www.securityfocus.com/bid/45145 CRLF injection vulnerability in the header function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via vectors related to non-whitespace characters preceded by newline characters, a different vulnerability than CVE-2010-2761 and CVE-2010-3172. I'm noting both together as I believe they should have equal affects across affected products (i.e. one won't affect in a place where another doesn't). If that is incorrect, we may need to split this bug into two. -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/perl-devel