Back to bug 1030572

Who When What Removed Added
Petr Pisar 2013-11-18 09:59:03 UTC Status NEW ASSIGNED
CC ppisar
Petr Pisar 2013-11-18 11:32:27 UTC Link ID CPAN 90474
Petr Pisar 2013-11-18 11:34:02 UTC Keywords Patch
Status ASSIGNED POST
Petr Pisar 2013-11-18 12:57:11 UTC Attachment #825551 Attachment is obsolete 0 1
Petr Pisar 2013-11-18 12:59:39 UTC Attachment #825588 Attachment is obsolete 0 1
Petr Pisar 2013-11-26 13:01:27 UTC Attachment #825589 Attachment is obsolete 0 1
Petr Pisar 2013-11-26 13:20:04 UTC Status POST MODIFIED
Fixed In Version perl-PlRPC-0.2020-13.el7
Doc Text Cause:
Reading documentation.
Consequence:
Documentation does not warn on use of insecure Storable
Perl module and possible reply attacks.
Fix:
RPC::PlServer documentation has been amended with notice
about use of insecure Storable Perl module and
possibility of reply attack. An external authentication
mechanism is recommended now.
Result:
Documentation warns users about possible security flaws
in the PlRPC server.
errata-xmlrpc 2013-11-26 13:24:04 UTC Status MODIFIED ON_QA
Ratul Gupta 2014-01-09 17:33:23 UTC Blocks 1051108
Ratul Gupta 2014-01-09 17:33:56 UTC Blocks 1051106
Vincent Danen 2014-01-09 22:23:10 UTC Keywords Security, SecurityTracking
Martin Kyral 2014-04-07 10:19:25 UTC CC mkyral
QA Contact qe-baseos-apps mkyral
errata-xmlrpc 2014-04-07 13:27:39 UTC Status ON_QA VERIFIED
Salvatore Bonaccorso 2014-04-21 12:00:20 UTC CC carnil
Petr Pisar 2014-06-12 08:01:38 UTC Status VERIFIED CLOSED
Resolution --- CURRENTRELEASE
Last Closed 2014-06-12 04:01:38 UTC

Back to bug 1030572