Bug 961066
Summary: | CVE-2009-3086 rubygem-actionpack: Message digest forgery [epel-5] | ||
---|---|---|---|
Product: | [Fedora] Fedora EPEL | Reporter: | Vincent Danen <vdanen> |
Component: | rubygem-actionpack | Assignee: | Michael Stahnke <mastahnke> |
Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | el5 | CC: | jrusnack, mastahnke, vanmeeuwen+fedora |
Target Milestone: | --- | Keywords: | Security, SecurityTracking |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | fst_owner=jrusnack | ||
Fixed In Version: | Doc Type: | Release Note | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2015-04-23 14:39:04 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 522162 |
Description
Vincent Danen
2013-05-08 17:42:51 UTC
Please use the following update submission link to create the Bodhi request for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure that all associated bugs get updated when new packages are pushed to stable. Please also ensure that the "Close bugs when update is stable" option remains checked. Bodhi update submission link: https://admin.fedoraproject.org/updates/new/?type_=security&bugs=522162,961066 Based on https://bugzilla.redhat.com/show_bug.cgi?id=522162#c3 this was intended to be fixed 3 years ago, however that build never made it to EPEL5; it was deleted: http://koji.fedoraproject.org/koji/buildinfo?buildID=169790 So this flaw is still present in EPEL5. This is fixed in anything > 2.3.4. Confirming this is fixed in rubygem-activesupport-2.3.18-1.el5.noarch currently shipped in EPEL 5. Closing ERRATA. |