Bug 903440 (CVE-2013-0333)
Summary: | CVE-2013-0333 rubygem-activesupport: json to yaml parsing | |||
---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Kurt Seifried <kseifried> | |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | |
Status: | CLOSED ERRATA | QA Contact: | ||
Severity: | urgent | Docs Contact: | ||
Priority: | urgent | |||
Version: | unspecified | CC: | athomas, bkabrda, bkearney, bleanhar, cpelland, dajohnso, dmcphers, ehelms, inecas, jeckersb, jialiu, jlieskov, jrafanie, khong, lmeyer, mkoci, mmccune, mmcgrath, morazi, msuchy, obarenbo, omaciel, sclewis, security-response-team, tdawson, vondruch, xtian | |
Target Milestone: | --- | Keywords: | Security | |
Target Release: | --- | |||
Hardware: | All | |||
OS: | Linux | |||
Whiteboard: | ||||
Fixed In Version: | Doc Type: | Bug Fix | ||
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 905666 (view as bug list) | Environment: | ||
Last Closed: | 2018-02-01 17:37:54 UTC | Type: | --- | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | 903443, 903444, 903445, 903446, 905373, 905374, 905375, 905376, 995677, 1165357 | |||
Bug Blocks: | 903448 | |||
Attachments: |
Description
Kurt Seifried
2013-01-24 01:48:26 UTC
Created attachment 686419 [details]
ror-2-3-json-parser-CVE-2013-0333.patch
Created attachment 686420 [details]
ror-3-0-json-parser-CVE-2013-0333.patch
Acknowledgements: Red Hat would like to thank Ruby on Rails upstream for reporting this issue. Upstream acknowledges Lawrence Pit of Mirror42 as the original reporter. Created attachment 688771 [details]
Updated patch (for 3.0 version) from upstream to fix this issue (see previous comment)
Created attachment 688784 [details]
For easier reading diff the diffs (to see what got changed)
Fast check against scratch build (https://brewweb.devel.redhat.com/taskinfo?taskID=5326330) with new patch from upstream looks ok. External References: http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/ This issue has been addressed in following products: RHEL 6 Version of OpenShift Enterprise Via RHSA-2013:0202 https://rhn.redhat.com/errata/RHSA-2013-0202.html This issue has been addressed in following products: Red Hat Subscription Asset Manager 1.1 Via RHSA-2013:0201 https://rhn.redhat.com/errata/RHSA-2013-0201.html This issue has been addressed in following products: CloudForms for RHEL 6 Via RHSA-2013:0203 https://rhn.redhat.com/errata/RHSA-2013-0203.html Can we get tracking bug for F16/F17? Thank you. Created rubygem-activesupport tracking bugs for this issue Affects: epel-5 [bug 905373] Affects: epel-6 [bug 905374] Affects: fedora-16 [bug 905375] Affects: fedora-17 [bug 905376] External References: https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/1h2DR63ViGo rubygem-activesupport-3.0.10-6.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report. rubygem-activesupport-3.0.11-8.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report. The EPEL 6 version is 2.3.8-2 so I'm guessing that's still affected. The EPEL 5 version is 2.1.1-2 so I'm not clear that that version is affected by this vulnerability. |