Bug 844457
Summary: | CVE-2012-2770 RT::Authen::ExternalAuth: RSS feed URL session hijacking [epel-6] | ||
---|---|---|---|
Product: | [Fedora] Fedora EPEL | Reporter: | Kurt Seifried <kseifried> |
Component: | perl-RT-Authen-ExternalAuth | Assignee: | Xavier Bachelot <xavier> |
Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | el5 | CC: | mi, somlo, xavier |
Target Milestone: | --- | Keywords: | Security, SecurityTracking |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Release Note | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2012-12-11 09:15:27 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 844454 |
Description
Kurt Seifried
2012-07-30 17:42:39 UTC
perl-RT-Authen-ExternalAuth-0.11-1.el6 has been submitted as an update for Fedora EPEL 6. https://admin.fedoraproject.org/updates/perl-RT-Authen-ExternalAuth-0.11-1.el6 I built and pushed into bodhi perl-RT-Authen-ExternalAuth-0.11-1.el6, which should take care of the problem. Xavier, at some point you asked to build/maintain a version for EL-5, so I'll leave this bug open and assign it to you, please feel free to apply the patch to 0.8 linked from bug # 844454. Regards, --Gabriel Thanks Gabriel, a build is on its way. I'll submit it to bodhi tomorrow morning. (In reply to comment #3) > Thanks Gabriel, a build is on its way. I'll submit it to bodhi tomorrow > morning. Ping. Package has been on testing for more than 3 weeks. I think, it can be pushed to stable. perl-RT-Authen-ExternalAuth-0.11-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report. |