在2018-三月-05 08:35:35 星期一时,perl5-security-report-followup@perl.org写到:
Show quoted text> Greetings,
>
> This message has been automatically generated in response to the
> creation of a perl security report regarding:
> "Fwd: [rt.cpan.org #124679] libwww-perl:redirect vulnerability in
> get()".
>
> There is no need to reply to this message right now. Your ticket has
> been
> assigned an ID of [perl #132938].
>
> Please include the string:
>
> [perl #132938]
>
> in the subject line of all future correspondence about this issue. To
> do so,
> you may reply to this message (please delete unnecessary quotes and
> text.)
>
> Thank you,
> perl5-security-report-followup@perl.org
>
> -------------------------------------------------------------------------
> Received: from xx1.develooper.com (xx1.dev [10.0.100.115]) by
> rtperl.develooper.com (Postfix) with ESMTP id D88741D9 for <rt-perl5-
> security@rtperl.dev>; Mon, 5 Mar 2018 05:35:22 -0800 (PST)
> Received: from localhost (xx1.develooper.com [127.0.0.1]) by localhost
> (Postfix) with ESMTP id AF06412119E for <rt-perl5-
> security@rtperl.dev>; Mon, 5 Mar 2018 05:35:21 -0800 (PST)
> Received: from xx1.develooper.com (xx1.develooper.com [127.0.0.1]) by
> localhost (Postfix) with SMTP id 65EB71211A8 for <rt-perl5-
> security@rtperl.dev>; Mon, 5 Mar 2018 05:35:20 -0800 (PST)
> Received: from x6.develooper.com (x6.develooper.com [207.171.7.86])
> (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client
> certificate requested) by xx1.develooper.com (Postfix) with ESMTPS id
> 318561211B8 for <rt-perl5-security@rt.perl.org>; Mon, 5 Mar 2018
> 05:35:19 -0800 (PST)
> Received: by x6.develooper.com (Postfix, from userid 514) id
> D17CB257B; Mon, 5 Mar 2018 05:35:19 -0800 (PST)
> Received: (qmail 12249 invoked from network); 5 Mar 2018 13:35:19
> -0000
> Received: from xx1.develooper.com (207.171.7.115) by x6.develooper.com
> with SMTP; 5 Mar 2018 13:35:19 -0000
> Received: from localhost (xx1.develooper.com [127.0.0.1]) by localhost
> (Postfix) with ESMTP id 38E8D1211A6 for <perlmail-perl5-security-
> report@onion.perl.org>; Mon, 5 Mar 2018 05:35:19 -0800 (PST)
> Received: from xx1.develooper.com (xx1.develooper.com [127.0.0.1]) by
> localhost (Postfix) with SMTP id 1E95812119E for <perlmail-perl5-
> security-report@onion.perl.org>; Mon, 5 Mar 2018 05:35:17 -0800 (PST)
> Received: from rtcpan.develooper.com (rtcpan.develooper.com
> [207.171.7.181]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256
> bits)) (No client certificate requested) by xx1.develooper.com
> (Postfix) with ESMTPS id 1928A12118E for <perl5-security-
> report@perl.org>; Mon, 5 Mar 2018 05:34:59 -0800 (PST)
> Received: by rtcpan.develooper.com (Postfix, from userid 536) id
> 620D2827; Mon, 5 Mar 2018 05:34:59 -0800 (PST)
> Message-ID: <20180305133459.620D2827@rtcpan.develooper.com>
> Date: Mon, 5 Mar 2018 08:34:59 -0500
> X-PMX-Version: 5.6.1.2065439, Antispam-Engine: 2.7.2.376379, Antispam-
> Data: 2018.3.5.132416
> X-PMX-Version: 5.6.1.2065439, Antispam-Engine: 2.7.2.376379, Antispam-
> Data: 2018.3.5.132416
> From: bug-libwww-perl@rt.cpan.org
> From perlmail@x6.develooper.com Mon Mar 5 05:35:23 2018
> Content-Type: multipart/mixed; boundary="----------=_1520256899-3662-
> 0"
> X-Original-To: rt-perl5-security@rtperl.dev
> Subject: Fwd: [rt.cpan.org #124679] libwww-perl:redirect vulnerability
> in get()
> To: perl5-security-report@perl.org
> X-RT-Mail-Extension: perl5-security
> X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on
> mx3.develooper.com
> CC:
> Delivered-To: rt-perl5-security@rtperl.dev
> Delivered-To: perlmail-perl5-security-report@onion.perl.org
> Return-Path: <perlmail@x6.develooper.com>
> X-Spam-Status: No, score=-2.2 required=6.0 tests=ALL_TRUSTED,BAYES_00,
> MIME_HEADER_CTYPE_ONLY,T_TVD_MIME_NO_HEADERS,URIBL_BLOCKED
> autolearn=no version=3.3.1
> X-RT-Interface: Email
So,someone has been dealing with this bug, right?This bug platform gives people the feeling is not very good.Until now, I still do not quite understand.