Source: perl Version: 5.14.2-21 Severity: important Tags: security upstream patch fixed-upstream
Hi Niko and Dominic, Know you are already aware of it, but creating a bug in BTS to have a easier trackability fo the security-tracker (thanks also for already requesting the upload trough wheezy-pu). CVE-2014-4330[0]: stack exhaustion in Data::Dumper If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2014-4330 [1] http://www.nntp.perl.org/group/perl.perl5.porters/2014/09/msg220118.html [2] http://perl5.git.perl.org/perl.git/commitdiff/19be3be6968e2337bcdfe480693fff795ecd1304 Thanks for your work! Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org