[Bug 870406] CVE-2012-4730 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735 CVE-2012-4884 rt3: Multiple flaws fixed in upstream 3.8.15 version
https://bugzilla.redhat.com/show_bug.cgi?id=870406 Bug 870406 depends on bug 870408, which changed state. Bug 870408 Summary: CVE-2012-4730 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735 CVE-2012-4884 rt3: Multiple flaws fixed in upstream 3.8.15 version [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=870408 What|Removed |Added Status|NEW |CLOSED Resolution|--- |EOL -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
[Bug 870406] CVE-2012-4730 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735 CVE-2012-4884 rt3: Multiple flaws fixed in upstream 3.8.15 version
https://bugzilla.redhat.com/show_bug.cgi?id=870406 Martin Prpic changed: What|Removed |Added Fixed In Version|3.8.15 |rt3 3.8.15 -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=GeEBINVPzX&a=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 870406] CVE-2012-4730 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735 CVE-2012-4884 rt3: Multiple flaws fixed in upstream 3.8.15 version
https://bugzilla.redhat.com/show_bug.cgi?id=870406 Jan Lieskovsky changed: What|Removed |Added Alias||CVE-2012-6578, ||CVE-2012-6579, ||CVE-2012-6580, ||CVE-2012-6581 --- Comment #3 from Jan Lieskovsky --- The CVE-2012-4735 identifier has been rejected in favour of: CVE-2012-6578, CVE-2012-6579, CVE-2012-6580, and CVE-2012-6581: == Name: CVE-2012-4735 ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-6578, CVE-2012-6579, CVE-2012-6580, CVE-2012-6581. Reason: This candidate is a duplicate of CVE-2012-6578, CVE-2012-6579, CVE-2012-6580, and CVE-2012-6581. Notes: All CVE users should reference one or more of CVE-2012-6578, CVE-2012-6579, CVE-2012-6580, and CVE-2012-6581 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. == with CVE-2012-6578, CVE-2012-6579, CVE-2012-6580, and CVE-2012-6581 description being as follows: == * CVE-2012-6578: Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled with a "Sign by default" queue configuration, uses a queue's key for signing, which might allow remote attackers to spoof messages by leveraging the lack of authentication semantics. References: http://lists.bestpractical.com/pipermail/rt-announce/2012-October/000212.html == * CVE-2012-6579: Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, allows remote attackers to configure encryption or signing for certain outbound e-mail, and possibly cause a denial of service (loss of e-mail readability), via an e-mail message to a queue's address. References: http://lists.bestpractical.com/pipermail/rt-announce/2012-October/000212.html == * CVE-2012-6580: Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, does not ensure that the UI labels unencrypted messages as unencrypted, which might make it easier for remote attackers to spoof details of a message's origin or interfere with encryption-policy auditing via an e-mail message to a queue's address. References: http://lists.bestpractical.com/pipermail/rt-announce/2012-October/000212.html == * CVE-2012-6581: Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, allows remote attackers to bypass intended restrictions on reading keys in the product's keyring, and trigger outbound e-mail messages signed by an arbitrary stored secret key, by leveraging a UI e-mail signing privilege. References: http://lists.bestpractical.com/pipermail/rt-announce/2012-October/000212.html -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=h0BltmVPUy&a=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 870406] CVE-2012-4730 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735 CVE-2012-4884 rt3: Multiple flaws fixed in upstream 3.8.15 version
Product: Security Response https://bugzilla.redhat.com/show_bug.cgi?id=870406 Bug 870406 depends on bug 870407, which changed state. Bug 870407 Summary: CVE-2012-4730 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735 CVE-2012-4884 rt3: Multiple flaws fixed in upstream 3.8.15 version [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=870407 What|Removed |Added Status|ON_QA |CLOSED Resolution|--- |ERRATA -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=Eg42ap7J0l&a=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 870406] CVE-2012-4730 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735 CVE-2012-4884 rt3: Multiple flaws fixed in upstream 3.8.15 version
https://bugzilla.redhat.com/show_bug.cgi?id=870406 --- Comment #2 from Jan Lieskovsky --- Regarding the RT v3.6 based version in Fedora EPEL 5. From [2]: "Patches for all releases of 3.8.x and 4.0.x are available for download below. As RT 3.6.x has reached end of life, we will not be releasing patches for it; please contact sales at bestpractical.com if you need assistance with RT versions older than 3.8.0." -- You are receiving this mail because: You are on the CC list for the bug. -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 870406] CVE-2012-4730 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735 CVE-2012-4884 rt3: Multiple flaws fixed in upstream 3.8.15 version
https://bugzilla.redhat.com/show_bug.cgi?id=870406 Jan Lieskovsky changed: What|Removed |Added Depends On||870407 Depends On||870408 --- Comment #1 from Jan Lieskovsky --- Created rt3 tracking bugs for this issue Affects: fedora-all [bug 870407] Affects: epel-all [bug 870408] -- You are receiving this mail because: You are on the CC list for the bug. -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 870406] CVE-2012-4730 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735 CVE-2012-4884 rt3: Multiple flaws fixed in upstream 3.8.15 version
https://bugzilla.redhat.com/show_bug.cgi?id=870406 Jan Lieskovsky changed: What|Removed |Added Fixed In Version||3.8.15 Summary|rt3: Multiple flaws fixed |CVE-2012-4730 CVE-2012-4732 |in upstream 3.8.15 version |CVE-2012-4734 CVE-2012-4735 ||CVE-2012-4884 rt3: Multiple ||flaws fixed in upstream ||3.8.15 version Alias||CVE-2012-4730, ||CVE-2012-4732, ||CVE-2012-4734, ||CVE-2012-4735, ||CVE-2012-4884 -- You are receiving this mail because: You are on the CC list for the bug. -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel