Branches for Hardy

Name Status Last Modified Last Commit
lp:ubuntu/hardy/perl 1 Development 2009-06-27 00:23:02 UTC
13. * SECURITY [CVE-2007-5116] (closes: #...

Author: Brendan O'Dea
Revision Date: 2007-11-08 08:42:01 UTC

* SECURITY [CVE-2007-5116] (closes: #450456): Apply patch from
  Will Drewry and Tavis Ormandy of the Google Security Team to fix a
  UTF-8 related heap overflow in Perl's regular expression compiler,
  probably allowing attackers to execute arbitrary code by compiling
  specially crafted regular expressions.

* Support "nocheck" option in DEB_BUILD_OPTIONS (closes: #449549).
* Suppress Configure test for ualarm() so that setitimer() emulation
  is used (closes: #448965).

lp:ubuntu/hardy-security/perl bug 1 Development 2011-04-22 12:48:43 UTC
16. * SECURITY UPDATE: multiple intended ...

Author: Marc Deslauriers
Revision Date: 2011-04-22 12:48:43 UTC

* SECURITY UPDATE: multiple intended restriction bypasses in Safe.pm
  - debian/patches/74_CVE-2010-1168: update Safe.pm to version 2.29 to
    fix multiple issues.
  - CVE-2010-1168
  - CVE-2010-1447
* SECURITY UPDATE: multiple issues in CGI.pm: hardcoded MIME boundary,
  and CRLF injections.
  - debian/patches/75_cgi-multiline-header: fix issues with patch
    obtained from (5.10.1-17).
  - CVE-2010-2716
  - CVE-2010-4410
  - CVE-2010-4411

lp:ubuntu/hardy-updates/perl 1 Development 2011-04-22 12:48:43 UTC
16. * SECURITY UPDATE: multiple intended ...

Author: Marc Deslauriers
Revision Date: 2011-04-22 12:48:43 UTC

* SECURITY UPDATE: multiple intended restriction bypasses in Safe.pm
  - debian/patches/74_CVE-2010-1168: update Safe.pm to version 2.29 to
    fix multiple issues.
  - CVE-2010-1168
  - CVE-2010-1447
* SECURITY UPDATE: multiple issues in CGI.pm: hardcoded MIME boundary,
  and CRLF injections.
  - debian/patches/75_cgi-multiline-header: fix issues with patch
    obtained from (5.10.1-17).
  - CVE-2010-2716
  - CVE-2010-4410
  - CVE-2010-4411

13 of 3 results