Source: ruby-ox Version: 2.1.1-2 Severity: grave Tags: security upstream Forwarded: https://github.com/ohler55/ox/issues/194
Hi, the following vulnerability was published for ruby-ox. Rationale for RC severity: think the issue warrants to be adressed for the next stable release. The issue itself possibly though does not warrant a DSA on it's own for stretch and jessie. CVE-2017-15928[0]: | In the Ox gem 2.8.0 for Ruby, the process crashes with a segmentation | fault when a crafted input is supplied to parse_obj. NOTE: the vendor | has stated "Ox should handle the error more gracefully" but has not | confirmed a security implication. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-15928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15928 [1] https://github.com/ohler55/ox/issues/194 [2] https://github.com/ohler55/ox/commit/e4565dbc167f0d38c3f93243d7a4fcfc391cbfc8 Regards, Salvatore _______________________________________________ Pkg-ruby-extras-maintainers mailing list Pkg-ruby-extras-maintainers@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-ruby-extras-maintainers