[Bug 877015] perl-CGI: Newline injection due to improper CRLF escaping in Set-Cookie and P3P headers

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015

Jan Lieskovsky <jlieskov@xxxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
         Whiteboard|impact=moderate,public=2012 |impact=moderate,public=2012
                   |1112,reported=20121115,sour |1112,reported=20121115,sour
                   |ce=internet,cvss2=2.6/AV:N/ |ce=internet,cvss2=2.6/AV:N/
                   |AC:H/Au:N/C:N/I:P/A:N,fedor |AC:H/Au:N/C:N/I:P/A:N,rhel-
                   |a-all/perl-CGI=affected     |5/perl=affected,rhel-6/perl
                   |                            |=affected,fedora-all/perl-C
                   |                            |GI=affected

-- 
You are receiving this mail because:
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/perl-devel



[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Legacy Announce]     [Fedora PHP Devel]     [Kernel Devel]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Big List of Linux Books]     [Gimp]     [Yosemite Information]
  Powered by Linux