| Summary: | CVE-2013-1821: ruby - entity expansion DoS vulnerability in REXML | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Oden Eriksson <oe> |
| Component: | Security | Assignee: | Mageia Bug Squad <bugsquad> |
| Status: | RESOLVED DUPLICATE | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | luigiwalser |
| Version: | 2 | ||
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1821 | ||
| Whiteboard: | |||
| Source RPM: | ruby | CVE: | |
| Status comment: | |||
|
Description
Oden Eriksson
2013-07-26 10:49:37 CEST
NOTE: this is fixed in updates_testing/ruby-1.8.7.p358-1.3.mga2.src.rpm with: ruby-2.0.0-add-missing-rexml-require.patch ruby-2.0.0-entity-expansion-DoS-vulnerability-in-REXML.patch How I hate the mga rpm changelogs... Status:
NEW =>
RESOLVED Fixed in Bug 9300. Oden, forget about the package changelogs. Bugzilla has this nice search feature. Go to the Search page, make sure you have Advanced Search selected (tab at top). Under Status:, hold the Ctrl key and click on RESOLVED. Then search for the package name you're interested in. Almost all of the security bugs have the CVE(s) at the end of the bug name. *** This bug has been marked as a duplicate of bug 9300 *** CC:
(none) =>
luigiwalser Note that you can also look at svnweb, which usually has the CVEs in the commit messages (not always in Cauldron, but almost always in stable). For instance: http://svnweb.mageia.org/packages/updates/2/ruby/current/SPECS/ruby.spec?view=log |