CVE-2009-0796 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0796): Cross-site scripting (XSS) vulnerability in Status.pm in Apache::Status and Apache2::Status in mod_perl1 and mod_perl2 for the Apache HTTP Server, when /perl-status is accessible, allows remote attackers to inject arbitrary web script or HTML via the URI.
Created attachment 188257 [details, diff] Patch from upstream SVN Patch for Apache2::Status (Apache::Status was only a part of mod_perl-1.x which we no longer have)
fixed in 2.0.4-r1
Ready to vote, I vote NO.
Stabling first. Arches, please test and mark stable =www-apache/mod_perl-2.0.4-r1 Target KEYWORDS="alpha amd64 hppa ia64 ppc ppc64 sparc x86"
(In reply to comment #4) > Stabling first. > > Arches, please test and mark stable > =www-apache/mod_perl-2.0.4-r1 > Target KEYWORDS="alpha amd64 hppa ia64 ppc ppc64 sparc x86" i had to drop keywords, please see #276593
mod_perl needs Apache-Reload Apache-Reload needs mod_perl...we are badly stuck.
(In reply to comment #6) > mod_perl needs Apache-Reload > Apache-Reload needs mod_perl...we are badly stuck. i have moved Apache-Reload into mod_perl's PDEPEND, so it should finally work now
x86 stable
Stable for HPPA.
alpha/ia64/sparc stable
amd64 stable
Marked ppc/ppc64 stable.
Ready for vote, I vote NO.
XSS -> No. Closing. Thanks everyone.