Summary: | <dev-ruby/haml-5.1.2: improper escaping of user input (CVE-2017-1002201) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | GLSAMaker/CVETool Bot <glsamaker> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | ruby |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://snyk.io/vuln/SNYK-RUBY-HAML-20362 | ||
Whiteboard: | B2 [glsa+ cve] | ||
Package list: |
dev-ruby/haml-5.1.2
|
Runtime testing required: | --- |
Description
GLSAMaker/CVETool Bot
2019-11-11 16:55:59 UTC
All packages in the tree should work with haml:5, so we should mark this as stable and remove haml:4 afterwards. x86 stable ppc64 stable ppc stable amd64 stable arm stable @maintainer(s), ok to cleanup? Masked for removal in 30 days. Resetting sanity check; keywords are not fully specified and arches are not CC-ed. Arches and Maintainer(s), Thank you for your work. New GLSA Request filed. This issue was resolved and addressed in GLSA 202007-27 at https://security.gentoo.org/glsa/202007-27 by GLSA coordinator Sam James (sam_c). |