Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 21 Jan 2014 18:18:07 -0500 (EST)
From: cve-assign@...re.org
To: gmc@...library.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: Perl module MARC::File::XML

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> the Perl module MARC::File::XML

> an XXE vulnerability that is fixed in version 1.0.2

Use CVE-2014-1626.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJS3vuoAAoJEKllVAevmvmsYWUH/iezhYWAQ2PRaRt6jRkMbAo1
GIKgRs4nPK34bWOsIiyyLAOzl5vjRg6S4WIEGgTS7JsZhTrhyli036ussHMEvhU4
aTyXesJsaKPuqMq0WMoEeyT9VYB3hwV8XzMMFaQ+X6ETYe/ryj+aGhu3N6F6wHXd
nWZKNjhDJPMgerm94hQ1mBHWMbZc185OtQmTXDBbTDx72iVrCXk2RVR4ZgONjSth
FPsfhC9cjzvV4Cyuix5OKgpuSmV0prxrywPnH0ldmS8OxGY5rPW/VqJa6LQDoCaG
h+v+avEGmHp++S/ttMDDM05qJXCa8q6tdEOSULLgRlVyuLhwWCCLsLMtFuWms88=
=oo+Y
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ