Name | CVE-2013-6461 |
Description | Nokogiri gem 1.5.x and 1.6.x has DoS while parsing XML entities by failing to apply limits |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
ruby-nokogiri (PTS) | jessie, jessie (lts) | 1.6.3.1+ds-1+deb8u3 | fixed |
| stretch (security), stretch (lts), stretch | 1.6.8.1-1+deb9u2 | fixed |
| buster (security), buster, buster (lts) | 1.10.0+dfsg1-2+deb10u1 | fixed |
| bullseye | 1.11.1+dfsg-2 | fixed |
| bullseye (security) | 1.11.1+dfsg-2+deb11u1 | fixed |
| bookworm | 1.13.10+dfsg-2 | fixed |
| sid, trixie | 1.16.4+dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
- ruby-nokogiri <not-affected> (jruby implementation not shiped)
- libnokogiri-ruby <not-affected> (1.4 and earlier not affected)
https://groups.google.com/forum/#!topic/ruby-security-ann/DeJpjTAg1FA