Skip to content

Commit

Permalink
- Update lang/ruby19 to 1.9.3p327
Browse files Browse the repository at this point in the history
- Document security issue in earlier versions

Security:	5e647ca3-2aea-11e2-b745-001fd0af1a4c
Feature safe:	yes
  • Loading branch information
swills committed Nov 10, 2012
1 parent adf70ef commit 66784eb
Show file tree
Hide file tree
Showing 3 changed files with 38 additions and 3 deletions.
2 changes: 1 addition & 1 deletion Mk/bsd.ruby.mk
Original file line number Original file line Diff line number Diff line change
Expand Up @@ -196,7 +196,7 @@ RUBY19= "@comment "
RUBY_RELVERSION= 1.9.3 RUBY_RELVERSION= 1.9.3
RUBY_PORTREVISION= 0 RUBY_PORTREVISION= 0
RUBY_PORTEPOCH= 1 RUBY_PORTEPOCH= 1
RUBY_PATCHLEVEL= 286 RUBY_PATCHLEVEL= 327


RUBY_VERSION?= ${RUBY_RELVERSION}.${RUBY_PATCHLEVEL} RUBY_VERSION?= ${RUBY_RELVERSION}.${RUBY_PATCHLEVEL}
RUBY_DISTVERSION?= ${RUBY_RELVERSION}-p${RUBY_PATCHLEVEL} RUBY_DISTVERSION?= ${RUBY_RELVERSION}-p${RUBY_PATCHLEVEL}
Expand Down
4 changes: 2 additions & 2 deletions lang/ruby19/distinfo
Original file line number Original file line Diff line number Diff line change
@@ -1,2 +1,2 @@
SHA256 (ruby/ruby-1.9.3-p286.tar.bz2) = 5281656c7a0ae48b64f28d845a96b4dfa16ba1357a911265752787585fb5ea64 SHA256 (ruby/ruby-1.9.3-p327.tar.bz2) = d989465242f9b11a8a3aa8cbd2c75a9b3a8c0ec2f14a087a0c7b51abf164e488
SIZE (ruby/ruby-1.9.3-p286.tar.bz2) = 9961862 SIZE (ruby/ruby-1.9.3-p327.tar.bz2) = 9975835
35 changes: 35 additions & 0 deletions security/vuxml/vuln.xml
Original file line number Original file line Diff line number Diff line change
Expand Up @@ -51,6 +51,41 @@ Note: Please add new entries to the beginning of this file.


--> -->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="5e647ca3-2aea-11e2-b745-001fd0af1a4c">
<topic>lang/ruby19 -- Hash-flooding DoS vulnerability for ruby 1.9</topic>
<affects>
<package>
<name>ruby</name>
<range><ge>1.9</ge><lt>1.9.3.327</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Hash-flooding DoS vulnerability</p>
<blockquote cite="http://www.ruby-lang.org/en/news/2012/11/09/ruby19-hashdos-cve-2012-5371/">
<p>Carefully crafted sequence of strings can cause a denial of service
attack on the service that parses the sequence to create a Hash
object by using the strings as keys. For instance, this
vulnerability affects web application that parses the JSON data
sent from untrusted entity.</p>
<p>This vulnerability is similar to CVS-2011-4815 for ruby 1.8.7. ruby
1.9 versions were using modified MurmurHash function but it's
reported that there is a way to create sequence of strings that
collide their hash values each other. This fix changes the Hash
function of String object from the MurmurHash to SipHash 2-4.</p>
</blockquote>
</body>
</description>
<references>
<cvename>CVE-2012-5371</cvename>
<url>http://www.ruby-lang.org/en/news/2012/11/09/ruby19-hashdos-cve-2012-5371/</url>
</references>
<dates>
<discovery>2012-11-10</discovery>
<entry>2012-11-10</entry>
</dates>
</vuln>

<vuln vid="152e4c7e-2a2e-11e2-99c7-00a0d181e71d"> <vuln vid="152e4c7e-2a2e-11e2-99c7-00a0d181e71d">
<topic>tomcat -- authentication weaknesses</topic> <topic>tomcat -- authentication weaknesses</topic>
<affects> <affects>
Expand Down

0 comments on commit 66784eb

Please sign in to comment.