block 913093 by 914187
thanks
Hi Moritz,
> This doesn't warrant a DSA, feel free to fix it via a point
> update, though!
Thanks, filed as #914187.
Best wishes,
--
,''`.
: :' : Chris Lamb
`. `'` la...@debian.org / chris-lamb.co.uk
`-
On Mon, Nov 19, 2018 at 03:17:48AM -0500, Chris Lamb wrote:
> Chris Lamb wrote:
>
> > Security team, I would be more than happy to prepare and upload a
> > stable security upload of this package when addressing it in jessie
> > LTS. Please let me know and I will come back with a debdiff.
> >
> >
Chris Lamb wrote:
> Security team, I would be more than happy to prepare and upload a
> stable security upload of this package when addressing it in jessie
> LTS. Please let me know and I will come back with a debdiff.
>
> Ruby team, I could easily upload to sid at the same time. Let me
> know to
Hi Salvatore et al.,
> Source: ruby-i18n
[…]
> CVE-2014-10077[0]:
> | Hash#slice in lib/i18n/core_ext/hash.rb in the i18n gem before 0.8.0
> | for Ruby allows remote attackers to cause a denial of service
> | (application crash) via a call in a situation where :some_key is
> | present in keep_keys
Source: ruby-i18n
Version: 0.7.0-2
Severity: important
Tags: security upstream
Forwarded: https://github.com/svenfuchs/i18n/pull/289
Hi,
The following vulnerability was published for ruby-i18n.
CVE-2014-10077[0]:
| Hash#slice in lib/i18n/core_ext/hash.rb in the i18n gem before 0.8.0
| for Ruby a
5 matches
Mail list logo