Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 273213 (CVE-2009-1904) - <dev-lang/ruby-{1.8.6_p369, 1.8.7_p173}: DoS in BigDecimal (CVE-2009-1904)
Summary: <dev-lang/ruby-{1.8.6_p369, 1.8.7_p173}: DoS in BigDecimal (CVE-2009-1904)
Status: RESOLVED FIXED
Alias: CVE-2009-1904
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://www.ruby-lang.org/en/news/2009...
Whiteboard: A3 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2009-06-08 15:29 UTC by Robert Buchholz (RETIRED)
Modified: 2009-06-28 21:36 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Buchholz (RETIRED) gentoo-dev 2009-06-08 15:29:43 UTC
** Please note that this issue is confidential and no information should be
disclosed until it is made public, see "Whiteboard" for a date **

A bug was found in a Ruby's standard library.  That bug enables third-party
people to cause ruby processes segfault.  CVE-2009-1904 was assigned to this.
A release containing a fix will be public soon.
Comment 1 Hans de Graaff gentoo-dev 2009-06-10 04:19:52 UTC
This bug just got reported on the Rails security list as well, which is out in the open. It also points to this news item:

http://www.ruby-lang.org/en/news/2009/06/09/dos-vulnerability-in-bigdecimal/

I've added both new versions to CVS, but I have not tested them very well yet.

Alex: I did confirm that 1.8.7_173 fixes my threading issues.
Comment 2 Alex Legler (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2009-06-10 05:43:37 UTC
Public via $URL.

Arches, please test and mark stable:
=dev-lang/ruby-1.8.6_p369
Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86"
Comment 3 Alex Legler (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2009-06-10 05:45:55 UTC
amd64 stable
Comment 4 Christian Faulhammer (RETIRED) gentoo-dev 2009-06-10 08:28:48 UTC
x86 stable
Comment 5 Jeroen Roovers gentoo-dev 2009-06-10 08:38:15 UTC
Stable for HPPA.
Comment 6 Tobias Klausmann gentoo-dev 2009-06-11 14:47:31 UTC
Stable on alpha.
Comment 7 Pedro Coelho 2009-06-12 01:25:48 UTC
shouldn't there be a glsa associated with this?
Comment 8 Alex Legler (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2009-06-12 07:13:17 UTC
(In reply to comment #7)
> shouldn't there be a glsa associated with this?
> 

After all security-supported architectures have stabled the package, yes.
Comment 9 Stefan Behte (RETIRED) gentoo-dev Security 2009-06-12 21:15:01 UTC
CVE-2009-1904 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1904):
  The BigDecimal library in Ruby 1.8.6 before p369 and 1.8.7 before
  p173 allows context-dependent attackers to cause a denial of service
  (application crash) via a string argument that represents a large
  number, as demonstrated by an attempted conversion to the Float data
  type.

Comment 10 Raúl Porcel (RETIRED) gentoo-dev 2009-06-16 18:34:58 UTC
arm/ia64/s390/sh/sparc stable
Comment 11 Brent Baude (RETIRED) gentoo-dev 2009-06-17 15:46:25 UTC
ppc64 done
Comment 12 Brent Baude (RETIRED) gentoo-dev 2009-06-21 14:17:37 UTC
ppc done
Comment 13 Alex Legler (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2009-06-21 14:30:56 UTC
GLSA draft filed.
Comment 14 Alex Legler (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2009-06-28 21:36:49 UTC
GLSA 200906-02