[Bug 658970] perl-CGI-Simple: CRLF injection vulnerability via a crafted URL

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=658970

--- Comment #8 from Jan Lieskovsky <jlieskov@xxxxxxxxxx> 2011-01-04 05:16:19 EST ---
Hi Tom,

(In reply to comment #7)
> Jan, is there a proper set of patches yet?

Not sure. There was a query from Ludwig Nussel:
[1] http://www.openwall.com/lists/oss-security/2010/12/16/4

regarding status of perl-CGI without reply. 

I can see the updated v1.113 perl-CGI-Simple / CPAN's CGI-Simple module
version (released on 2010-12-27):
[2] http://search.cpan.org/dist/CGI-Simple/

but not sure if this is the definitive one addressing both CVE issues.

Asked Mark Stosberg and Andy Armstrong:
[3] http://www.openwall.com/lists/oss-security/2011/01/04/5

for further background details / patches clarification (you were Cc-ed).

HTH, Jan.

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Legacy Announce]     [Fedora PHP Devel]     [Kernel Devel]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Big List of Linux Books]     [Gimp]     [Yosemite Information]
  Powered by Linux