Summary: | <dev-ruby/crack-0.3.2: YAML parameter parsing vulnerability (CVE-2013-1800) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | ruby |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=917236 | ||
Whiteboard: | B1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() Crack 0.3.2 has already been in the tree for several months, so we can mark that stable. =dev-ruby/crack-0.3.2 amd64 stable x86 stable New GLSA request filed. CVE-2013-1800 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1800): The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156. This issue was resolved and addressed in GLSA 201404-04 at http://security.gentoo.org/glsa/glsa-201404-04.xml by GLSA coordinator Mikle Kolyada (Zlogene). |