From Mageia wiki
Jump to: navigation, search

MGASA-2013-0092

Date: March 15rd, 2013
Affected releases: 2
Media: Core


Description:
Updated ruby packages fix security vulnerability:

It was discovered that Ruby's REXML library did not properly restrict XML
entity expansion. An attacker could use this flaw to cause a denial of
service by tricking a Ruby application using REXML to read text nodes from
specially-crafted XML content, which will result in REXML consuming large
amounts of system memory (CVE-2013-1821).

Updated Packages:
i586:
ruby-tk-1.8.7.p358-1.2.mga2.i586
ruby-doc-1.8.7.p358-1.2.mga2.noarch
ruby-1.8.7.p358-1.2.mga2.i586
ruby-devel-1.8.7.p358-1.2.mga2.i586

x86_64:
ruby-tk-1.8.7.p358-1.2.mga2.x86_64
ruby-doc-1.8.7.p358-1.2.mga2.noarch
ruby-1.8.7.p358-1.2.mga2.x86_64
ruby-devel-1.8.7.p358-1.2.mga2.x86_64

SRPMS:
ruby-1.8.7.p358-1.2.mga2

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1821
http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/
https://rhn.redhat.com/errata/RHSA-2013-0612.html
https://bugs.mageia.org/show_bug.cgi?id=9300