{"id":"RHSA-2013:0202","summary":"Red Hat Security Advisory: rubygem-activesupport security update","modified":"2026-01-29T10:55:45.492389Z","published":"2024-09-15T20:33:44Z","upstream":["CVE-2013-0333"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2013:0202"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#critical"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=903440"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0202.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-0333"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-0333"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-0333"},{"type":"ARTICLE","url":"https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/1h2DR63ViGo"}],"affected":[{"package":{"name":"rubygem-activesupport","ecosystem":"Red Hat:openshift:1::el6","purl":"pkg:rpm/redhat/rubygem-activesupport"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:3.0.13-4.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0202.json"}}],"schema_version":"1.7.3"}