Processing commands for cont...@bugs.debian.org: > #perl (5.14.2-16) UNRELEASED; urgency=low > # > # * [SECURITY] CVE-2012-5526: CGI.pm improper cookie and p3p > # CRLF escaping (Closes: #693420) > # * [SECURITY] Fix misparsing of maketext strings which could allow > # arbitrary code execution from untrusted maketext templates > # (Closes: #695224) > # * [SECURITY] add warning to Storable documentation that Storable > # documents should not be accepted from untrusted sources > # (Closes: #695223) > # > limit source perl Limiting to bugs with field 'source' containing at least one of 'perl' Limit currently set to 'source':'perl'
> tags 693420 + pending Bug #693420 [perl-modules] CVE-2012-5526 CGI.pm: Newline injection due to improper CRLF escaping in Set-Cookie and P3P headers Added tag(s) pending. > tags 695224 + pending Bug #695224 [perl-modules] perl-modules: Locale::Maketext code injection Added tag(s) pending. > tags 695223 + pending Bug #695223 [perl] perl: Storable docs don't advise against using untrusted data Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 693420: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=693420 695223: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695223 695224: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695224 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org