Summary: | <dev-lang/ruby-{1.8.6_p369, 1.8.7_p173}: DoS in BigDecimal (CVE-2009-1904) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Robert Buchholz (RETIRED) <rbu> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | ruby, veszig |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.ruby-lang.org/en/news/2009/06/09/dos-vulnerability-in-bigdecimal/ | ||
Whiteboard: | A3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Robert Buchholz (RETIRED)
![]() This bug just got reported on the Rails security list as well, which is out in the open. It also points to this news item: http://www.ruby-lang.org/en/news/2009/06/09/dos-vulnerability-in-bigdecimal/ I've added both new versions to CVS, but I have not tested them very well yet. Alex: I did confirm that 1.8.7_173 fixes my threading issues. Public via $URL. Arches, please test and mark stable: =dev-lang/ruby-1.8.6_p369 Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86" amd64 stable x86 stable Stable for HPPA. Stable on alpha. shouldn't there be a glsa associated with this? (In reply to comment #7) > shouldn't there be a glsa associated with this? > After all security-supported architectures have stabled the package, yes. CVE-2009-1904 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1904): The BigDecimal library in Ruby 1.8.6 before p369 and 1.8.7 before p173 allows context-dependent attackers to cause a denial of service (application crash) via a string argument that represents a large number, as demonstrated by an attempted conversion to the Float data type. arm/ia64/s390/sh/sparc stable ppc64 done ppc done GLSA draft filed. GLSA 200906-02 |