https://bugzilla.redhat.com/show_bug.cgi?id=1452050
--- Comment #2 from Dhiru Kholia ---
Statement:
Red Hat Product Security has rated this issue as having Low security impact.
This issue is not currently planned to be addressed in future updates. For
additional information, refer to the Issue
https://bugzilla.redhat.com/show_bug.cgi?id=1452050
Dhiru Kholia changed:
What|Removed |Added
Status|NEW |CLOSED
Resolution|---
https://bugzilla.redhat.com/show_bug.cgi?id=1452050
Dhiru Kholia changed:
What|Removed |Added
Whiteboard|impact=low,public=20160813, |impact=low,public=20160813,
https://bugzilla.redhat.com/show_bug.cgi?id=1452050
Dhiru Kholia changed:
What|Removed |Added
Priority|medium |low
Whiteboard|impact=moderate,p
https://bugzilla.redhat.com/show_bug.cgi?id=1452050
Andrej Nemec changed:
What|Removed |Added
Blocks||1452052
Dhiru Kholia changed:
https://bugzilla.redhat.com/show_bug.cgi?id=1452050
Bug 1452050 depends on bug 1452051, which changed state.
Bug 1452051 Summary: CVE-2016-10374 perltidy: Uses current working directory
without symlink-attack protection [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1452051
https://bugzilla.redhat.com/show_bug.cgi?id=1452050
Andrej Nemec changed:
What|Removed |Added
Depends On||1452051
--- Comment #1 from Andrej Nem