Summary: | dev-lang/ruby <1.8.6_p287-r1 REXML DoS Vulnerability (CVE-2008-3790) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Alex Legler (RETIRED) <a3li> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | ruby |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml/ | ||
Whiteboard: | B3? [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 225465 | ||
Bug Blocks: |
Description
Alex Legler (RETIRED)
![]() ![]() ![]() ruby team, please bump as necessary. ruby-1.8.6_p287-r1 has this patch applied and is currently in CVS. I'll evaluate stabilizing this weekend, along with the other open ruby security bugs. We'll handle stabling on bug 225465 as soon as appropriate. Hans, do I understand correctly we need to bump rails to 2.0.4 / 2.1.1 so it can actually use the entity limit? http://weblog.rubyonrails.org/2008/9/5/rails-2-1-1-lots-of-bug-fixes My understanding is that these versions of Rails contain a monkey patch for fix the REXML problem. We already have this fixed in ruby 1.8.6_p287-r1, so the monkey patch in these rails versions won't have any effect. Updating whiteboard, fixed packages have been in the tree for some time already (see 225465). Security should vote on sending a GLSA or simply combining this issue with above mentioned other bug. Combining with the above mentioned bug since we already have a request for that in the pool. GLSA 200812-17, thanks everyone, sorry about the delay. This issue was resolved and addressed in GLSA 201110-02 at http://security.gentoo.org/glsa/glsa-201110-02.xml by GLSA coordinator Alex Legler (a3li). |