Debian Bug report logs -
#777230
libmp3-info-perl: CVE-2013-6499: loading a module relative to the cwd
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Alexander Wirt <formorer@debian.org>
:
Bug#777230
; Package src:libmp3-info-perl
.
(Fri, 06 Feb 2015 16:06:06 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Alexander Wirt <formorer@debian.org>
.
(Fri, 06 Feb 2015 16:06:06 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Source: libmp3-info-perl
Version: 1.24-1
Severity: important
Tags: security upstream
Hi,
the following vulnerability was published for libmp3-info-perl.
CVE-2013-6499[0]:
loading a module relative to the cwd
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2013-6499
[1] https://bugzilla.redhat.com/show_bug.cgi?id=1018805
Regards,
Salvatore
Information forwarded
to debian-bugs-dist@lists.debian.org, Alexander Wirt <formorer@debian.org>
:
Bug#777230
; Package src:libmp3-info-perl
.
(Thu, 27 Aug 2015 16:00:04 GMT) (full text, mbox, link).
Acknowledgement sent
to gregor herrmann <gregoa@debian.org>
:
Extra info received and forwarded to list. Copy sent to Alexander Wirt <formorer@debian.org>
.
(Thu, 27 Aug 2015 16:00:04 GMT) (full text, mbox, link).
Message #10 received at 777230@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On Fri, 06 Feb 2015 17:04:40 +0100, Salvatore Bonaccorso wrote:
> the following vulnerability was published for libmp3-info-perl.
>
> CVE-2013-6499[0]:
> loading a module relative to the cwd
>
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
>
> For further information see:
>
> [0] https://security-tracker.debian.org/tracker/CVE-2013-6499
> [1] https://bugzilla.redhat.com/show_bug.cgi?id=1018805
FWIW, the bug is closed in Red Hat Bugzilla mentioned above as
"bogus".
Cheers,
gregor
--
.''`. Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06
: :' : Debian GNU/Linux user, admin, and developer - https://www.debian.org/
`. `' Member of VIBE!AT & SPI, fellow of the Free Software Foundation Europe
`- NP: Jerry Lee Lewis: Great Balls Of Fire
[signature.asc (application/pgp-signature, inline)]
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Wed Jun 19 13:09:22 2019;
Machine Name:
beach
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.