Package "libcgi-simple-perl"
Name: |
libcgi-simple-perl
|
Description: |
simple CGI.pm compatible OO CGI interface
|
Latest version: |
1.113-1 |
Release: |
precise (12.04) |
Level: |
base |
Repository: |
universe |
Homepage: |
http://search.cpan.org/dist/CGI-Simple/ |
Links
Download "libcgi-simple-perl"
Other versions of "libcgi-simple-perl" in Precise
No other version of this package is available
in the Precise release.
Changelog
No changelog for deleted or moved packages.
|
libcgi-simple-perl (1.113-1) unstable; urgency=low
[ Nathan Handler ]
* debian/watch: Update to ignore development releases.
[ Ryan Niebur ]
* Email change: Ryan Niebur -> ryan@debian.org
[ gregor herrmann ]
* Improve reference to documentation in long description, thanks to Frank
Gevaerts for the bug report (closes: #576530).
* Email change: gregor herrmann -> gregoa@debian.org
* Email change: Jose Luis Rivas -> ghostbar@debian.org
* Minimize debian/rules.
* debian/copyright: update formatting.
* Set Standards-Version to 3.9.1; remove version from perl build dependency.
* Rephrase short description.
[ Ansgar Burchardt ]
* Email change: Ansgar Burchardt -> ansgar@debian.org
[ Damyan Ivanov ]
* New upstream release
+ Contains fixes to CVE-2010-4410 and CVE-2010-2761
* add a patch for CVE-2010-4410
+ add libtest-exception-perl to dependencies
* use "3.0 (quilt)" source format
[ Niko Tyni ]
* [SECURITY] CVE-2010-4411: fix a newline injection issue that resulted
from an incomplete fix for CVE-2010-4410.
-- gregor herrmann Wed, 09 Feb 2011 17:14:01 +0100
|
576530 |
Package description has some strange bits - Debian Bug report logs |
CVE-2010-4410 |
["CRLF injection vulnerability in the header function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier allows remote attac |
CVE-2010-2761 |
["The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary |
CVE-2010-4411 |
["Unspecified vulnerability in CGI.pm 3.50 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting at |
|
No changelog for deleted or moved packages.
|
About
-
Send Feedback to @ubuntu_updates