libapache2-mod-perl2 stable update for CVE-2007-1349
nion at debian.org
Fri Jan 11 01:21:41 UTC 2008
the following CVE (Common Vulnerabilities & Exposures) id was
published for libapache2-mod-perl2 some time ago.
| PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in
| mod_perl 2.x, does not properly escape PATH_INFO before use in a
| regular expression, which allows remote attackers to cause a denial of
| service (resource consumption) via a crafted URI.
Unfortunately the vulnerability described above is not important enough
to get it fixed via regular security update in Debian stable. It does
not warrant a DSA.
However it would be nice if this could get fixed via a regular point update.
Please contact the release team for this.
This is an automatically generated mail, in case you are already working on an
upgrade this is of course pointless.
You can find a patch on:
You can see the status of this vulnerability on:
For further information:
Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 189 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/pkg-perl-maintainers/attachments/20080111/0cbf5782/attachment.pgp
More information about the pkg-perl-maintainers