This bug was fixed in the package ruby-activesupport-3.2 -
3.2.6-4ubuntu0.1

---------------
ruby-activesupport-3.2 (3.2.6-4ubuntu0.1) quantal-security; urgency=low

  * SECURITY UPDATE: vulnerabilities in parameter parsing (LP: #1098357)
    - debian/patches/CVE-2013-0156.patch: added patch from Debian 3.2.6-5
    - CVE-2013-0156
 -- Marc Deslauriers <[email protected]>   Fri, 18 Jan 2013 08:43:58 
-0500

** Changed in: ruby-extlib (Ubuntu Quantal)
       Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1098357

Title:
  update libextlib-ruby/ruby-extlib packages for CVE-2013-0156

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libextlib-ruby/+bug/1098357/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to