diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2020-10-19 06:47:18 +0200 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2020-10-19 06:47:18 +0200 |
commit | 1f506a78e3b41d4702885725f31365ca904150be (patch) | |
tree | 7c798b3ec029f0b8384813f2392b592545be7fa5 /data/CVE/2013.list | |
parent | 69965a94c5034a91bad13b83ced1dd7a111c7354 (diff) |
src:rubygems has been re-introduced into the archive
The initial upload states:
- Upstream bundler source code is now hosted in the same git repository as
rubygems, due to that this new source package is introduced and it will
provide the binaries previously provided by src:bundler (ruby-bundler
and bundler). src:bundler will be removed after src:rubygems is accepted.
We need to recheck if any of this previously unfixed issues are still
unfixed or now adressed with this initial first re-upload.
Diffstat (limited to 'data/CVE/2013.list')
-rw-r--r-- | data/CVE/2013.list | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/data/CVE/2013.list b/data/CVE/2013.list index 0cf7e4e4ee..af225c318c 100644 --- a/data/CVE/2013.list +++ b/data/CVE/2013.list @@ -8192,7 +8192,7 @@ CVE-2013-4365 (Heap-based buffer overflow in the fcgid_header_bucket_read functi CVE-2013-4364 ((1) oo-analytics-export and (2) oo-analytics-import in the openshift-o ...) NOT-FOR-US: OpenShift CVE-2013-4363 (Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION ...) - - rubygems <removed> (unimportant; bug #722361) + - rubygems <unfixed> (unimportant; bug #722361) - libgems-ruby <removed> (unimportant; bug #722361) NOTE: Non-issue, you trust the site providing the gem with installing arbitrary code, allowing NOTE: it a potential elevated CPU consumption doesn't add any extra harm @@ -8482,7 +8482,7 @@ CVE-2013-4288 (Race condition in PolicyKit (aka polkit) allows local users to by [squeeze] - policykit-1 <no-dsa> (The update only deprecates an API and introduces a new option for pkcheck, no src package uses this API) [wheezy] - policykit-1 <no-dsa> (The update only deprecates an API and introduces a new option for pkcheck, no src package uses this API) CVE-2013-4287 (Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN ...) - - rubygems <removed> (unimportant; bug #722361) + - rubygems <unfixed> (unimportant; bug #722361) - libgems-ruby <removed> (unimportant; bug #722361) NOTE: Non-issue, you trust the site providing the gem with installing arbitrary code, allowing NOTE: it a potential elevated CPU consumption doesn't add any extra harm |