[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#648237: marked as done (ITP: libcgi-application-plugin-protectcsrf-perl -- plugin to generate and verify anti-CSRF challenges)



Your message dated Fri, 11 Nov 2011 23:04:48 +0000
with message-id <E1RP09Q-0004Fk-31@franck.debian.org>
and subject line Bug#648237: fixed in libcgi-application-plugin-protectcsrf-perl 1.01-1
has caused the Debian Bug report #648237,
regarding ITP: libcgi-application-plugin-protectcsrf-perl -- plugin to generate and verify anti-CSRF challenges
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
648237: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=648237
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Owner: Nicholas Bamber <nicholas@periapt.co.uk>,
Jaldhar H. Vyas <jaldhar@debian.org>
Severity: wishlist
X-Debbugs-CC: debian-devel@lists.debian.org,debian-perl@lists.debian.org

* Package name    : libcgi-application-plugin-protectcsrf-perl
  Version         : 1.01
  Upstream Author : Akira Horimoto <kurt0027@gmail.com>
* URL             : http://search.cpan.org/dist/CGI-Application-Plugin-ProtectCSRF/
* License         : Artistic or GPL-1+
  Programming Lang: Perl
  Description     : plugin to generate and verify anti-CSRF challenges

CGI::Application::Plugin::ProtectCSRF is a CGI::Application plugin that
helps protect against CSRF attacks. It works by tying back the processing
of a form to the display of a form.

A cross-site request forgery is a form of online attack in which Mr Attacker
posts what appears to be an image in, say, a forum. However the image src
attribute is carefully crafted to undertake some action desired by Mr Attacker
on the target website. The trap is sprung when Mr Victim, logs on to the
target website and then views the image set up by Mr Attacker in the same
browser.



--- End Message ---
--- Begin Message ---
Source: libcgi-application-plugin-protectcsrf-perl
Source-Version: 1.01-1

We believe that the bug you reported is fixed in the latest version of
libcgi-application-plugin-protectcsrf-perl, which is due to be installed in the Debian FTP archive:

libcgi-application-plugin-protectcsrf-perl_1.01-1.debian.tar.gz
  to main/libc/libcgi-application-plugin-protectcsrf-perl/libcgi-application-plugin-protectcsrf-perl_1.01-1.debian.tar.gz
libcgi-application-plugin-protectcsrf-perl_1.01-1.dsc
  to main/libc/libcgi-application-plugin-protectcsrf-perl/libcgi-application-plugin-protectcsrf-perl_1.01-1.dsc
libcgi-application-plugin-protectcsrf-perl_1.01-1_all.deb
  to main/libc/libcgi-application-plugin-protectcsrf-perl/libcgi-application-plugin-protectcsrf-perl_1.01-1_all.deb
libcgi-application-plugin-protectcsrf-perl_1.01.orig.tar.gz
  to main/libc/libcgi-application-plugin-protectcsrf-perl/libcgi-application-plugin-protectcsrf-perl_1.01.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 648237@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Nicholas Bamber <nicholas@periapt.co.uk> (supplier of updated libcgi-application-plugin-protectcsrf-perl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Fri, 11 Nov 2011 20:36:24 +0000
Source: libcgi-application-plugin-protectcsrf-perl
Binary: libcgi-application-plugin-protectcsrf-perl
Architecture: source all
Version: 1.01-1
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group <pkg-perl-maintainers@lists.alioth.debian.org>
Changed-By: Nicholas Bamber <nicholas@periapt.co.uk>
Description: 
 libcgi-application-plugin-protectcsrf-perl - plugin to generate and verify anti-CSRF challenges
Closes: 648237
Changes: 
 libcgi-application-plugin-protectcsrf-perl (1.01-1) unstable; urgency=low
 .
   * Split off from
     libcgi-application-extra-plugin-bundle-perl (Closes: #648237).
Checksums-Sha1: 
 37c02dc3e5f1cb486b9d8b63b4222828102f7ef0 2539 libcgi-application-plugin-protectcsrf-perl_1.01-1.dsc
 941db100684c8c9309d2aaefc04c2b2d34111e30 6838 libcgi-application-plugin-protectcsrf-perl_1.01.orig.tar.gz
 5e4fa186d74d4afcc618f3c013f41b607379a261 5762 libcgi-application-plugin-protectcsrf-perl_1.01-1.debian.tar.gz
 279ec348540279f638539488bdf622f4dd6c4114 12002 libcgi-application-plugin-protectcsrf-perl_1.01-1_all.deb
Checksums-Sha256: 
 2716034d224b10c43b15f533c9c3cf11e5613ea5c07ca816639f11398a078d5f 2539 libcgi-application-plugin-protectcsrf-perl_1.01-1.dsc
 7b51d210b42119ca663c7ac718596161ad54c89bb9144ca9aff1f0af4d6aca61 6838 libcgi-application-plugin-protectcsrf-perl_1.01.orig.tar.gz
 f523ff30cbcdc8009bbaf511006df87de96e77ece26c8a5423d83d4ca1bc930c 5762 libcgi-application-plugin-protectcsrf-perl_1.01-1.debian.tar.gz
 9541bf3b48f6e9be20d0ef0c879e8900f67ddb943035f9f5d9ea65d2742bb4fb 12002 libcgi-application-plugin-protectcsrf-perl_1.01-1_all.deb
Files: 
 05c0d956e0ecc60f9dbc7340c2c00ab0 2539 perl optional libcgi-application-plugin-protectcsrf-perl_1.01-1.dsc
 fce5e1b034b55b1b54b3e6512fe8d289 6838 perl optional libcgi-application-plugin-protectcsrf-perl_1.01.orig.tar.gz
 8563df4572a78715f4a37c18a2db900e 5762 perl optional libcgi-application-plugin-protectcsrf-perl_1.01-1.debian.tar.gz
 3580bfed8fe2fe875277c8e6d670eb90 12002 perl optional libcgi-application-plugin-protectcsrf-perl_1.01-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iQIcBAEBCAAGBQJOvYhWAAoJELbE2bY7/+c81rQP/iZg7G9pmvw1KV5g1L5qfdjD
JHFr5FXzgWQtlH5UJ4glfLGOnHpFPjbmXDvWOgDnqzcaE4S7V1C1vNVBDAqKs4sX
GLE3Dfq3wb7LlH6Uy0X9gc95Bo0HRYJHUUSRtR9vRAAEs+MipQ5vzfzifs1qhLPR
LDczHAvZEHgyJqxYkdsSMwD2J53jmN20haEi+VTGlGqdq+grmMYgxyTbC+37uQ3Y
mD6+/uFmt73fbxacCd9e+DubO1ihYjkGhlu1eOBV09B+lMdMXb+Ic59rnYFtz/Ng
fIOWf4eyEV/9FWTQbnlzfsN04qNzZGhCxNOdH138ZqIgBtEJaRClOYRnWhGmbOtx
5Gu8hu0ETW7lAysplQ5AevvlczzP2nJbBz01PxaTvAZ6eVzl3CpMZ9lTJVuFN1Uo
dpgt5m8f419O59CsqUf1OuqLoZQk7EwEMSL5aCTa9gh0d+NZc/AGgdJj9ozniag5
HL+jSxcAJzZ93y+ONajl+xHWJ1jy66HmrG7NW1IB04eprBjYDs2U1BAhAwxM/pEv
I+NfiyWmD8BmcB4gWghalqcLLGDOM27QrpqIVrwfHrfwS5LVBiYRKtGWot/0CCD+
HTxTn+0E/EkwAsMXn6VrUqy3hola21RvY8zov6CkDEEVacgq22XCh8oaCSp/BeHh
CVbgt5W+Qu62E2e0HD3g
=xGcv
-----END PGP SIGNATURE-----



--- End Message ---

Reply to: