[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#700455: unblock: ruby1.9.1/1.9.3.194-6



Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: unblock

Please unblock package ruby1.9.1

This release fixes a security bug (Debian #6999291, CVE-2013-0256)

the debdiff against the package in testing is attached

unblock ruby1.9.1/1.9.3.194-6

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=pt_BR.utf8, LC_CTYPE=pt_BR.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

-- 
Antonio Terceiro <terceiro@debian.org>
diff -Nru ruby1.9.1-1.9.3.194/debian/changelog ruby1.9.1-1.9.3.194/debian/changelog
--- ruby1.9.1-1.9.3.194/debian/changelog	2012-11-27 18:42:09.000000000 -0300
+++ ruby1.9.1-1.9.3.194/debian/changelog	2013-02-12 16:04:22.000000000 -0300
@@ -1,3 +1,11 @@
+ruby1.9.1 (1.9.3.194-6) unstable; urgency=high
+
+  [Nobuhiro Iwamatsu]
+  * debian/patches/CVE-2013-0256.patch: fix possible cross site scripting
+    vulnerability in documentation generated by RDOC (Closes: #699929)
+
+ -- Antonio Terceiro <terceiro@debian.org>  Tue, 12 Feb 2013 16:00:30 -0300
+
 ruby1.9.1 (1.9.3.194-5) unstable; urgency=high
 
   * Disable running the test suite during the build on sparc again. Keeping
diff -Nru ruby1.9.1-1.9.3.194/debian/patches/CVE-2013-0256.patch ruby1.9.1-1.9.3.194/debian/patches/CVE-2013-0256.patch
--- ruby1.9.1-1.9.3.194/debian/patches/CVE-2013-0256.patch	1969-12-31 21:00:00.000000000 -0300
+++ ruby1.9.1-1.9.3.194/debian/patches/CVE-2013-0256.patch	2013-02-12 16:04:22.000000000 -0300
@@ -0,0 +1,36 @@
+From fd061353e3312b77b48eee7cf96cab8ca9b797ac Mon Sep 17 00:00:00 2001
+From: usa <usa@b2dd03c8-39d4-4d8f-98ff-823fe69b080e>
+Date: Wed, 6 Feb 2013 08:00:49 +0000
+Subject: [PATCH] * lib/rdoc: Import RDoc 3.9.5.
+ NOTE: This patch includes only main correctios.
+Origin: upstream, https://github.com/ruby/ruby/commit/fd061353e3312b77b48eee7cf96cab8ca9b797ac
+Bug: http://www.ruby-lang.org/ja/news/2013/02/06/rdoc-xss-cve-2013-0256/
+Bug-Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699929
+
+diff --git a/lib/rdoc/generator/template/darkfish/js/darkfish.js b/lib/rdoc/generator/template/darkfish/js/darkfish.js
+index 84565c1..7a2f44c 100644
+--- a/lib/rdoc/generator/template/darkfish/js/darkfish.js
++++ b/lib/rdoc/generator/template/darkfish/js/darkfish.js
+@@ -73,13 +73,15 @@ function hookQuickSearch() {
+ function highlightTarget( anchor ) {
+ 	console.debug( "Highlighting target '%s'.", anchor );
+ 
+-	$("a[name=" + anchor + "]").each( function() {
+-		if ( !$(this).parent().parent().hasClass('target-section') ) {
+-			console.debug( "Wrapping the target-section" );
+-			$('div.method-detail').unwrap( 'div.target-section' );
+-			$(this).parent().wrap( '<div class="target-section"></div>' );
+-		} else {
+-			console.debug( "Already wrapped." );
++	$("a[name]").each( function() {
++		if ( $(this).attr("name") == anchor ) {
++			if ( !$(this).parent().parent().hasClass('target-section') ) {
++				console.debug( "Wrapping the target-section" );
++				$('div.method-detail').unwrap( 'div.target-section' );
++				$(this).parent().wrap( '<div class="target-section"></div>' );
++			} else {
++				console.debug( "Already wrapped." );
++			}
+ 		}
+ 	});
+ };
diff -Nru ruby1.9.1-1.9.3.194/debian/patches/series ruby1.9.1-1.9.3.194/debian/patches/series
--- ruby1.9.1-1.9.3.194/debian/patches/series	2012-11-21 23:39:33.000000000 -0300
+++ ruby1.9.1-1.9.3.194/debian/patches/series	2013-02-12 16:04:22.000000000 -0300
@@ -19,3 +19,4 @@
 20120927-cve_2011_1005.patch
 CVE-2012-4522.patch
 20121120-cve-2012-5371.diff
+CVE-2013-0256.patch

Attachment: signature.asc
Description: Digital signature


Reply to: