Processing commands for cont...@bugs.debian.org:

> found 714541 1.8.7.302-2
Bug #714541 [ruby1.8] ruby1.8: CVE-2013-4073: Hostname check bypassing 
vulnerability in SSL client
Marked as found in versions ruby1.8/1.8.7.302-2.
> found 714541 1.8.7.358-7
Bug #714541 [ruby1.8] ruby1.8: CVE-2013-4073: Hostname check bypassing 
vulnerability in SSL client
Marked as found in versions ruby1.8/1.8.7.358-7.
> found 714543 1.9.2.0-2
Bug #714543 [ruby1.9.1] ruby1.9.1: CVE-2013-4073: Hostname check bypassing 
vulnerability in SSL client
Marked as found in versions ruby1.9.1/1.9.2.0-2.
> found 714543 1.9.3.194-8.1
Bug #714543 [ruby1.9.1] ruby1.9.1: CVE-2013-4073: Hostname check bypassing 
vulnerability in SSL client
Marked as found in versions ruby1.9.1/1.9.3.194-8.1.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
714541: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714541
714543: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714543
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to