Package: perl-modules
Version: 5.14.2-21
Severity: important
Tags: fixed-upstream

This CVE relates to the fact that Module::Metadata docs imply that
the module being analyzed isn't executed, but to get the version
number code execution does happen. The same issue should be fixed
in the separate Module::Metadata package.

Fixed in sid in 

http://anonscm.debian.org/gitweb/?p=perl/perl.git;a=commit;h=306408a7d8d7aa85860b711a565a047e488884a0


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to