rails: CVE-2013-0333: Vulnerability in JSON Parser
Bug #1119256 reported by
Stefan Sänger
This bug affects 2 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
ruby-activesupport-2.3 (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Oneiric |
Fix Released
|
High
|
Unassigned | ||
Precise |
Fix Released
|
High
|
Unassigned | ||
Quantal |
Fix Released
|
High
|
Unassigned | ||
Raring |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
The CVE mentioned in summary caused quite some media attention in germany. According to
http://
This is quite strange - is there nobody maintaining ruby-activesupport for precise (LTS!) anymore?
I only saw a later package for raring so far, but I did not check if the required patch is incorporated there.
information type: | Private Security → Public Security |
Changed in ruby-activesupport-2.3 (Ubuntu): | |
status: | Incomplete → Triaged |
Changed in ruby-activesupport-2.3 (Ubuntu Oneiric): | |
status: | In Progress → Fix Committed |
Changed in ruby-activesupport-2.3 (Ubuntu Precise): | |
status: | In Progress → Fix Committed |
Changed in ruby-activesupport-2.3 (Ubuntu Quantal): | |
status: | In Progress → Fix Committed |
To post a comment you must log in.
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https:/ /wiki.ubuntu. com/SecurityTea m/UpdateProcedu res