diff options
author | stas <stas@FreeBSD.org> | 2009-06-13 06:07:41 +0800 |
---|---|---|
committer | stas <stas@FreeBSD.org> | 2009-06-13 06:07:41 +0800 |
commit | 31909e5425229485a948fb25f14d5a7164540c3c (patch) | |
tree | 955b30941bfe9d76e68bb42ccfc6555fdb541c52 /security/vuxml | |
parent | a56e19a57873441c0400ad8e1b8b8e63e1693706 (diff) | |
download | freebsd-ports-gnome-31909e5425229485a948fb25f14d5a7164540c3c.tar.gz freebsd-ports-gnome-31909e5425229485a948fb25f14d5a7164540c3c.tar.zst freebsd-ports-gnome-31909e5425229485a948fb25f14d5a7164540c3c.zip |
- Document ruby denial of sevice vulnerability in BigDecimal.
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 36 |
1 files changed, 36 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 9c504e88adfa..feee7990fde7 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,42 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="62e0fbe5-5798-11de-bb78-001cc0377035"> + <topic>ruby -- BigDecimal denial of service vulnerability</topic> + <affects> + <package> + <name>ruby</name> + <name>ruby+pthreads</name> + <name>ruby+pthreads+oniguruma</name> + <name>ruby+oniguruma</name> + <range><ge>1.8.*,1</ge><lt>1.8.7.160_1,1</lt></range> + <range><ge>1.9.*,1</ge><lt>1.9.1.129_1,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The official ruby site reports:</p> + <blockquote cite="http://www.ruby-lang.org/en/news/2009/06/09/dos-vulnerability-in-bigdecimal/"> + <p>A denial of service (DoS) vulnerability was found on the + BigDecimal standard library of Ruby. Conversion from BigDecimal + objects into Float numbers had a problem which enables attackers + to effectively cause segmentation faults.</p> + <p>An attacker can cause a denial of service by causing BigDecimal + to parse an insanely large number, such as:</p> + <p><code>BigDecimal("9E69999999").to_s("F")</code></p> + </blockquote> + </body> + </description> + <references> + <bid>35278</bid> + <url>http://www.ruby-lang.org/en/news/2009/06/09/dos-vulnerability-in-bigdecimal/</url> + </references> + <dates> + <discovery>2009-06-09</discovery> + <entry>2009-06-13</entry> + </dates> + </vuln> + <vuln vid="da185955-5738-11de-b857-000f20797ede"> <topic>mozilla -- multiple vulnerabilities</topic> <affects> |