summaryrefslogtreecommitdiffstats
path: root/data/CVE/2013.list
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2020-10-19 06:47:18 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2020-10-19 06:47:18 +0200
commit1f506a78e3b41d4702885725f31365ca904150be (patch)
tree7c798b3ec029f0b8384813f2392b592545be7fa5 /data/CVE/2013.list
parent69965a94c5034a91bad13b83ced1dd7a111c7354 (diff)
src:rubygems has been re-introduced into the archive
The initial upload states: - Upstream bundler source code is now hosted in the same git repository as rubygems, due to that this new source package is introduced and it will provide the binaries previously provided by src:bundler (ruby-bundler and bundler). src:bundler will be removed after src:rubygems is accepted. We need to recheck if any of this previously unfixed issues are still unfixed or now adressed with this initial first re-upload.
Diffstat (limited to 'data/CVE/2013.list')
-rw-r--r--data/CVE/2013.list4
1 files changed, 2 insertions, 2 deletions
diff --git a/data/CVE/2013.list b/data/CVE/2013.list
index 0cf7e4e4ee..af225c318c 100644
--- a/data/CVE/2013.list
+++ b/data/CVE/2013.list
@@ -8192,7 +8192,7 @@ CVE-2013-4365 (Heap-based buffer overflow in the fcgid_header_bucket_read functi
CVE-2013-4364 ((1) oo-analytics-export and (2) oo-analytics-import in the openshift-o ...)
NOT-FOR-US: OpenShift
CVE-2013-4363 (Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION ...)
- - rubygems <removed> (unimportant; bug #722361)
+ - rubygems <unfixed> (unimportant; bug #722361)
- libgems-ruby <removed> (unimportant; bug #722361)
NOTE: Non-issue, you trust the site providing the gem with installing arbitrary code, allowing
NOTE: it a potential elevated CPU consumption doesn't add any extra harm
@@ -8482,7 +8482,7 @@ CVE-2013-4288 (Race condition in PolicyKit (aka polkit) allows local users to by
[squeeze] - policykit-1 <no-dsa> (The update only deprecates an API and introduces a new option for pkcheck, no src package uses this API)
[wheezy] - policykit-1 <no-dsa> (The update only deprecates an API and introduces a new option for pkcheck, no src package uses this API)
CVE-2013-4287 (Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN ...)
- - rubygems <removed> (unimportant; bug #722361)
+ - rubygems <unfixed> (unimportant; bug #722361)
- libgems-ruby <removed> (unimportant; bug #722361)
NOTE: Non-issue, you trust the site providing the gem with installing arbitrary code, allowing
NOTE: it a potential elevated CPU consumption doesn't add any extra harm

© 2014-2024 Faster IT GmbH | imprint | privacy policy