Note: This is a public test instance of Red Hat Bugzilla. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback at bugzilla.redhat.com.
Bug 921329 (CVE-2013-1854)
Summary: | CVE-2013-1854 rubygem-activerecord: attribute_dos Symbol DoS vulnerability | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Kurt Seifried <kseifried> | ||||||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||||
Status: | CLOSED ERRATA | QA Contact: | |||||||||
Severity: | medium | Docs Contact: | |||||||||
Priority: | medium | ||||||||||
Version: | unspecified | CC: | athomas, bkabrda, bkearney, bleanhar, ccoleman, cpelland, dajohnso, dmcphers, jeckersb, jialiu, jlieskov, jrusnack, katello-bugs, katello-internal, lmeyer, mastahnke, mmccune, mmcgrath, mmorsi, morazi, msuchy, mtasaka, sclewis, security-response-team, sseago, vanmeeuwen+fedora, vondruch | ||||||||
Target Milestone: | --- | Keywords: | Security | ||||||||
Target Release: | --- | ||||||||||
Hardware: | All | ||||||||||
OS: | Linux | ||||||||||
Whiteboard: | |||||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||||
Doc Text: |
A flaw was found in the way Ruby on Rails handled hashes in certain queries. A remote attacker could use this flaw to perform a denial of service (resource consumption) attack by sending specially crafted queries that would result in the creation of Ruby symbols, which were never garbage collected.
|
Story Points: | --- | ||||||||
Clone Of: | Environment: | ||||||||||
Last Closed: | 2015-01-17 05:33:22 UTC | Type: | --- | ||||||||
Regression: | --- | Mount Type: | --- | ||||||||
Documentation: | --- | CRM: | |||||||||
Verified Versions: | Category: | --- | |||||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||||
Embargoed: | |||||||||||
Bug Depends On: | 924316, 924318, 995660, 1030761, 1165368 | ||||||||||
Bug Blocks: | |||||||||||
Attachments: |
|
Description
Kurt Seifried
2013-03-14 02:46:43 UTC
Created attachment 710223 [details]
2-3-attribute_symbols.patch
Created attachment 710224 [details]
3-1-attribute_symbols.patch
Created attachment 710225 [details]
3-2-attribute_symbols.patch
Please note that upstream reports that the patches have an issue and will be reissued this weekend most likely so we might need to respin this fix. Please note that these patches were not affected by the upstream changes. Can I get tracking bug for F18? F17 should not be affected. Thank you. Created rubygem-activerecord tracking bugs for this issue Affects: fedora-18 [bug 924316] Affects: epel-5 [bug 924318] Acknowledgements: Red Hat would like to thank Ruby on Rails upstream for reporting this issue. Upstream acknowledges Ben Murphy as the original reporter. This issue has been addressed in following products: RHEL 6 Version of OpenShift Enterprise Via RHSA-2013:0699 https://rhn.redhat.com/errata/RHSA-2013-0699.html (In reply to comment #11) > Can I get tracking bug for F18? F17 should not be affected. Thank you. Done, can you mark these as needinfo in future? Thanks. The Red Hat Security Response Team has rated this issue as having moderate security impact in CloudForms 1.1. This issue is not currently planned to be addressed in future updates. IssueDescription: A flaw was found in the way Ruby on Rails handled hashes in certain queries. A remote attacker could use this flaw to perform a denial of service (resource consumption) attack by sending specially crafted queries that would result in the creation of Ruby symbols, which were never garbage collected. rubygem-actionpack-2.3.18-1.el5, rubygem-activerecord-2.3.18-1.el5, rubygem-activesupport-2.3.18-1.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in the following products: Red Hat Subscription Asset Manager 1.4 Via RHSA-2014:1863 https://rhn.redhat.com/errata/RHSA-2014-1863.html |