[Bug 870406] CVE-2012-4730 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735 CVE-2012-4884 rt3: Multiple flaws fixed in upstream 3.8.15 version

2020-11-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=870406
Bug 870406 depends on bug 870408, which changed state.

Bug 870408 Summary: CVE-2012-4730 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735 
CVE-2012-4884 rt3: Multiple flaws fixed in upstream 3.8.15 version [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=870408

   What|Removed |Added

 Status|NEW |CLOSED
 Resolution|--- |EOL




-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org


[Bug 870406] CVE-2012-4730 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735 CVE-2012-4884 rt3: Multiple flaws fixed in upstream 3.8.15 version

2015-02-05 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=870406

Martin Prpic mpr...@redhat.com changed:

   What|Removed |Added

   Fixed In Version|3.8.15  |rt3 3.8.15



-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=GeEBINVPzXa=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 870406] CVE-2012-4730 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735 CVE-2012-4884 rt3: Multiple flaws fixed in upstream 3.8.15 version

2013-07-24 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=870406

Jan Lieskovsky jlies...@redhat.com changed:

   What|Removed |Added

  Alias||CVE-2012-6578,
   ||CVE-2012-6579,
   ||CVE-2012-6580,
   ||CVE-2012-6581

--- Comment #3 from Jan Lieskovsky jlies...@redhat.com ---
The CVE-2012-4735 identifier has been rejected in favour of: CVE-2012-6578,
CVE-2012-6579, CVE-2012-6580, and CVE-2012-6581:

==
Name: CVE-2012-4735

** REJECT **

DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-6578,
CVE-2012-6579, CVE-2012-6580, CVE-2012-6581. Reason: This candidate
is a duplicate of CVE-2012-6578, CVE-2012-6579, CVE-2012-6580, and
CVE-2012-6581. Notes: All CVE users should reference one or more of
CVE-2012-6578, CVE-2012-6579, CVE-2012-6580, and CVE-2012-6581
instead of this candidate. All references and descriptions in this
candidate have been removed to prevent accidental usage.

==

with CVE-2012-6578, CVE-2012-6579, CVE-2012-6580, and CVE-2012-6581 description
being as follows:

==

* CVE-2012-6578:
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when
GnuPG is enabled with a Sign by default queue configuration, uses a queue's
key for signing, which might allow remote attackers to spoof messages by 
leveraging the lack of authentication semantics.

References:
http://lists.bestpractical.com/pipermail/rt-announce/2012-October/000212.html
==

* CVE-2012-6579:
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when
GnuPG is enabled, allows remote attackers to configure encryption or signing
for certain outbound e-mail, and possibly cause a denial of service (loss of
e-mail readability), via an e-mail message to a queue's address.

References:
http://lists.bestpractical.com/pipermail/rt-announce/2012-October/000212.html
==

* CVE-2012-6580:
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when
GnuPG is enabled, does not ensure that the UI labels unencrypted messages as
unencrypted, which might make it easier for remote attackers to spoof details
of a message's origin or interfere with encryption-policy auditing via an
e-mail message to a queue's address.

References:
http://lists.bestpractical.com/pipermail/rt-announce/2012-October/000212.html
==

* CVE-2012-6581:
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when
GnuPG is enabled, allows remote attackers to bypass intended restrictions on
reading keys in the product's keyring, and trigger outbound e-mail messages
signed by an arbitrary stored secret key, by leveraging a UI e-mail signing
privilege.

References:
http://lists.bestpractical.com/pipermail/rt-announce/2012-October/000212.html

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=h0BltmVPUya=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 870406] CVE-2012-4730 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735 CVE-2012-4884 rt3: Multiple flaws fixed in upstream 3.8.15 version

2012-12-20 Thread bugzilla
Product: Security Response
https://bugzilla.redhat.com/show_bug.cgi?id=870406

Bug 870406 depends on bug 870407, which changed state.

Bug 870407 Summary: CVE-2012-4730 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735 
CVE-2012-4884 rt3: Multiple flaws fixed in upstream 3.8.15 version [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=870407

   What|Removed |Added

 Status|ON_QA   |CLOSED
 Resolution|--- |ERRATA

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=Eg42ap7J0la=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 870406] CVE-2012-4730 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735 CVE-2012-4884 rt3: Multiple flaws fixed in upstream 3.8.15 version

2012-10-26 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=870406

Jan Lieskovsky jlies...@redhat.com changed:

   What|Removed |Added

   Fixed In Version||3.8.15
Summary|rt3: Multiple flaws fixed   |CVE-2012-4730 CVE-2012-4732
   |in upstream 3.8.15 version  |CVE-2012-4734 CVE-2012-4735
   ||CVE-2012-4884 rt3: Multiple
   ||flaws fixed in upstream
   ||3.8.15 version
  Alias||CVE-2012-4730,
   ||CVE-2012-4732,
   ||CVE-2012-4734,
   ||CVE-2012-4735,
   ||CVE-2012-4884

-- 
You are receiving this mail because:
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 870406] CVE-2012-4730 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735 CVE-2012-4884 rt3: Multiple flaws fixed in upstream 3.8.15 version

2012-10-26 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=870406

Jan Lieskovsky jlies...@redhat.com changed:

   What|Removed |Added

 Depends On||870407
 Depends On||870408

--- Comment #1 from Jan Lieskovsky jlies...@redhat.com ---
Created rt3 tracking bugs for this issue

Affects: fedora-all [bug 870407]
Affects: epel-all [bug 870408]

-- 
You are receiving this mail because:
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 870406] CVE-2012-4730 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735 CVE-2012-4884 rt3: Multiple flaws fixed in upstream 3.8.15 version

2012-10-26 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=870406

--- Comment #2 from Jan Lieskovsky jlies...@redhat.com ---
Regarding the RT v3.6 based version in Fedora EPEL 5. From [2]:

Patches for all releases of 3.8.x and 4.0.x are available for download below.
As RT 3.6.x has reached end of life, we will not be releasing patches for it;
please contact sales at bestpractical.com if you need assistance with RT
versions older than 3.8.0.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel