This bug was fixed in the package perl - 5.8.8-12ubuntu0.7
--------------- perl (5.8.8-12ubuntu0.7) hardy-security; urgency=low
* SECURITY UPDATE: Injection problem in Digest::new - CVE-2011-3597 - http://rt.cpan.org/Public/Bug/Display.html?id=71390 * SECURITY UPDATE: Heap overflow in "x" operator (LP: #1069034) - CVE-2012-5195 - http://www.nntp.perl.org/group/perl.perl5.porters/2012/10/msg193886.html * SECURITY UPDATE: CGI.pm improper cookie and p3p CRLF escaping - CVE-2012-5526 - http://github.com/markstos/CGI.pm/pull/23.patch -- Seth Arnold <email address hidden> Tue, 27 Nov 2012 23:15:32 -0800
This bug was fixed in the package perl - 5.8.8-12ubuntu0.7
---------------
perl (5.8.8-12ubuntu0.7) hardy-security; urgency=low
* SECURITY UPDATE: Injection problem in Digest::new rt.cpan. org/Public/ Bug/Display. html?id= 71390 www.nntp. perl.org/ group/perl. perl5.porters/ 2012/10/ msg193886. html github. com/markstos/ CGI.pm/ pull/23. patch
- CVE-2011-3597
- http://
* SECURITY UPDATE: Heap overflow in "x" operator (LP: #1069034)
- CVE-2012-5195
- http://
* SECURITY UPDATE: CGI.pm improper cookie and p3p CRLF escaping
- CVE-2012-5526
- http://
-- Seth Arnold <email address hidden> Tue, 27 Nov 2012 23:15:32 -0800