Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
--- Comment #17 from errata-xmlrpc errata-xml...@redhat.com ---
This issue has been addressed in following products:
Red Hat Enterprise Linux 5
Red Hat Enterprise Linux 6
Via RHSA-2013:0685
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
Vincent Danen vda...@redhat.com changed:
What|Removed |Added
Status|NEW
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
--- Comment #15 from Petr Pisar ppi...@redhat.com ---
Created attachment 704881
-- https://bugzilla.redhat.com/attachment.cgi?id=704881action=edit
Fix ported to perl-5.10.1
--
You are receiving this mail because:
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
--- Comment #16 from Petr Pisar ppi...@redhat.com ---
Created attachment 705046
-- https://bugzilla.redhat.com/attachment.cgi?id=705046action=edit
Fix ported to perl-5.8.8
--
You are receiving this mail because:
You
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
Stefan Cornelius scorn...@redhat.com changed:
What|Removed |Added
Depends On|
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
Stefan Cornelius scorn...@redhat.com changed:
What|Removed |Added
Depends On|
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
Stefan Cornelius scorn...@redhat.com changed:
What|Removed |Added
Depends On|
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
Stefan Cornelius scorn...@redhat.com changed:
What|Removed |Added
Depends On|
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
Bug 877015 depends on bug 876974, which changed state.
Bug 876974 Summary: CVE-2012-5526 perl-CGI: Newline injection due to improper
CRLF escaping in Set-Cookie and P3P headers [fedora-all]
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
--- Comment #13 from Fedora Update System upda...@fedoraproject.org ---
perl-CGI-3.52-203.fc16, perl-5.14.3-203.fc16 has been pushed to the Fedora 16
stable repository. If problems still persist, please make note of it
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
Bug 877015 depends on bug 876974, which changed state.
Bug 876974 Summary: CVE-2012-5526 perl-CGI: Newline injection due to improper
CRLF escaping in Set-Cookie and P3P headers [fedora-all]
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
Bug 877015 depends on bug 876974, which changed state.
Bug 876974 Summary: CVE-2012-5526 perl-CGI: Newline injection due to improper
CRLF escaping in Set-Cookie and P3P headers [fedora-all]
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
Bug 877015 depends on bug 876974, which changed state.
Bug 876974 Summary: CVE-2012-5526 perl-CGI: Newline injection due to improper
CRLF escaping in Set-Cookie and P3P headers [fedora-all]
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
--- Comment #12 from Fedora Update System upda...@fedoraproject.org ---
perl-CGI-3.52-218.fc17, perl-5.14.3-218.fc17 has been pushed to the Fedora 17
stable repository. If problems still persist, please make note of it
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
Bug 877015 depends on bug 876974, which changed state.
Bug 876974 Summary: CVE-2012-5526 perl-CGI: Newline injection due to improper
CRLF escaping in Set-Cookie and P3P headers [fedora-all]
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
--- Comment #11 from Fedora Update System upda...@fedoraproject.org ---
perl-CGI-3.59-235.fc18, perl-5.16.2-235.fc18 has been pushed to the Fedora 18
stable repository. If problems still persist, please make note of it
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
Bug 877015 depends on bug 876974, which changed state.
Bug 876974 Summary: CVE-2012-5526 perl-CGI: Newline injection due to improper
CRLF escaping in Set-Cookie and P3P headers [fedora-all]
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
--- Comment #10 from Fedora Update System upda...@fedoraproject.org ---
perl-CGI-3.51-7.fc17 has been pushed to the Fedora 17 stable repository. If
problems still persist, please make note of it in this bug report.
--
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
Bug 877015 depends on bug 876974, which changed state.
Bug 876974 Summary: CVE-2012-5526 perl-CGI: Newline injection due to improper
CRLF escaping in Set-Cookie and P3P headers [fedora-all]
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
Bug 877015 depends on bug 876974, which changed state.
Bug 876974 Summary: CVE-2012-5526 perl-CGI: Newline injection due to improper
CRLF escaping in Set-Cookie and P3P headers [fedora-all]
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
--- Comment #9 from Fedora Update System upda...@fedoraproject.org ---
perl-CGI-3.51-10.fc18 has been pushed to the Fedora 18 stable repository. If
problems still persist, please make note of it in this bug report.
--
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
--- Comment #5 from Petr Pisar ppi...@redhat.com ---
Created attachment 646250
-- https://bugzilla.redhat.com/attachment.cgi?id=646250action=edit
Upstream fix
--
You are receiving this mail because:
You are on the
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
--- Comment #6 from Tomas Hoger tho...@redhat.com ---
Upstream commits:
https://github.com/markstos/CGI.pm/commit/80f44433a43b51e5851218a08f6920adfb91991a
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=877015
Vincent Danen vda...@redhat.com changed:
What|Removed |Added
Summary|perl-CGI: Newline
24 matches
Mail list logo