Bug 856830 (CVE-2013-6460) - VUL-1: CVE-2013-6461: rubygem-nokogiri: Multiple DoS vulnerabilities
Summary: VUL-1: CVE-2013-6461: rubygem-nokogiri: Multiple DoS vulnerabilities
Status: RESOLVED FIXED
Alias: CVE-2013-6460
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Normal
Target Milestone: ---
Assignee: Jordi Massaguer
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-12-27 08:30 UTC by Marcus Meissner
Modified: 2016-04-27 20:08 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2013-12-27 08:30:18 UTC
CVE-2013-6461 / CVE-2013-6460

(one of the xml expansion problems resurfaced)

From: Ratul Gupta <ratulg@redhat.com>
Subject: [oss-security] CVE Request: rubygem-nokogiri Multiple DoS vulnerabilities

Hello,

1) https://bugzilla.redhat.com/show_bug.cgi?id=1046663

Nokogiri gem for Ruby was found to be affected by a DoS vulnerability, 
where an error when parsing XML documents can be exploited by an 
attacker to cause an infinite loop and subsequently exhaust memory and 
cause a crash via a specially crafted XML document.

2) https://bugzilla.redhat.com/show_bug.cgi?id=1046664

Nokogiri gem for Ruby was found to be affected by a DoS vulnerability, 
where an error when parsing XML entities and can be exploited to exhaust 
memory and cause a crash via a specially crafted XML document including 
external entity references.


References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6460
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6461
https://bugzilla.redhat.com/show_bug.cgi?id=1046663
https://bugzilla.redhat.com/show_bug.cgi?id=1046664
http://comments.gmane.org/gmane.comp.security.oss.general/11748
Comment 1 Marcus Meissner 2013-12-27 08:36:51 UTC
Original References:
https://bugs.gentoo.org/show_bug.cgi?id=495218

Original Advisory:
https://groups.google.com/forum/#!topic/ruby-security-ann/DeJpjTAg1FA
Comment 2 Swamp Workflow Management 2013-12-27 23:00:17 UTC
bugbot adjusting priority
Comment 3 Jordi Massaguer 2014-01-09 16:28:56 UTC
As stated in the original advisory, this affects jruby. We don't ship jruby thus I would suggest we close this bug.
Comment 4 Marcus Meissner 2014-01-09 16:31:56 UTC
yep, lets do this