Summary: | <dev-db/mongodb-{2.4.13,2.6.8}: DoS due to improper BSON validation (CVE-2015-1609) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | bug, bugs, proxy-maint, ultrabug |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1200446 | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2015-03-11 08:02:21 UTC
Thanks a lot mate. Yes, unaffected packages are in tree already so please stabilize the following packages and drop the affected ones. - mongodb-2.4.13.ebuild - mongodb-2.6.8.ebuild or do you want separate bug filled with depend on this one ? Arches, please test and mark stable: =dev-db/mongodb-2.4.13 =dev-db/mongodb-2.6.8 Target keywords : "amd64 x86" amd64 stable x86 stable. Maintainer(s), please cleanup. Security, please vote. Cleanup done, thx ago. Arches and Maintainer(s), Thank you for your work. Vote: Yes CVE-2015-1609 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1609): MongoDB before 2.4.13 and 2.6.x before 2.6.8 allows remote attackers to cause a denial of service via a crafted UTF-8 string in a BSON request. GLSA Vote: Yes, new request filed This issue was resolved and addressed in GLSA 201611-13 at https://security.gentoo.org/glsa/201611-13 by GLSA coordinator Aaron Bauman (b-man). |