Date: Sat, 10 Nov 2012 09:08:00 -0600 From: Bryan Drewery <bdrewery@freebsd.org> To: Steve Wills <swills@freebsd.org> Cc: svn-ports-head@freebsd.org, svn-ports-all@freebsd.org, ports-committers@freebsd.org Subject: Re: svn commit: r307261 - in head: Mk lang/ruby19 security/vuxml Message-ID: <509E6DD0.6070403@FreeBSD.org> In-Reply-To: <201211100400.qAA40fAB022144@svn.freebsd.org> References: <201211100400.qAA40fAB022144@svn.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On 11/9/2012 10:00 PM, Steve Wills wrote: > Author: swills > Date: Sat Nov 10 04:00:41 2012 > New Revision: 307261 > URL: http://svnweb.freebsd.org/changeset/ports/307261 > > Log: > - Update lang/ruby19 to 1.9.3p327 > - Document security issue in earlier versions > > Security: 5e647ca3-2aea-11e2-b745-001fd0af1a4c > Feature safe: yes Thank you for the quick update! > > Modified: > head/Mk/bsd.ruby.mk > head/lang/ruby19/distinfo > head/security/vuxml/vuln.xml > > Modified: head/Mk/bsd.ruby.mk > ============================================================================== > --- head/Mk/bsd.ruby.mk Sat Nov 10 01:37:24 2012 (r307260) > +++ head/Mk/bsd.ruby.mk Sat Nov 10 04:00:41 2012 (r307261) > @@ -196,7 +196,7 @@ RUBY19= "@comment " > RUBY_RELVERSION= 1.9.3 > RUBY_PORTREVISION= 0 > RUBY_PORTEPOCH= 1 > -RUBY_PATCHLEVEL= 286 > +RUBY_PATCHLEVEL= 327 > > RUBY_VERSION?= ${RUBY_RELVERSION}.${RUBY_PATCHLEVEL} > RUBY_DISTVERSION?= ${RUBY_RELVERSION}-p${RUBY_PATCHLEVEL} > > Modified: head/lang/ruby19/distinfo > ============================================================================== > --- head/lang/ruby19/distinfo Sat Nov 10 01:37:24 2012 (r307260) > +++ head/lang/ruby19/distinfo Sat Nov 10 04:00:41 2012 (r307261) > @@ -1,2 +1,2 @@ > -SHA256 (ruby/ruby-1.9.3-p286.tar.bz2) = 5281656c7a0ae48b64f28d845a96b4dfa16ba1357a911265752787585fb5ea64 > -SIZE (ruby/ruby-1.9.3-p286.tar.bz2) = 9961862 > +SHA256 (ruby/ruby-1.9.3-p327.tar.bz2) = d989465242f9b11a8a3aa8cbd2c75a9b3a8c0ec2f14a087a0c7b51abf164e488 > +SIZE (ruby/ruby-1.9.3-p327.tar.bz2) = 9975835 > > Modified: head/security/vuxml/vuln.xml > ============================================================================== > --- head/security/vuxml/vuln.xml Sat Nov 10 01:37:24 2012 (r307260) > +++ head/security/vuxml/vuln.xml Sat Nov 10 04:00:41 2012 (r307261) > @@ -51,6 +51,41 @@ Note: Please add new entries to the beg > > --> > <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> > + <vuln vid="5e647ca3-2aea-11e2-b745-001fd0af1a4c"> > + <topic>lang/ruby19 -- Hash-flooding DoS vulnerability for ruby 1.9</topic> > + <affects> > + <package> > + <name>ruby</name> > + <range><ge>1.9</ge><lt>1.9.3.327</lt></range> > + </package> > + </affects> > + <description> > + <body xmlns="http://www.w3.org/1999/xhtml"> > + <p>Hash-flooding DoS vulnerability</p> > + <blockquote cite="http://www.ruby-lang.org/en/news/2012/11/09/ruby19-hashdos-cve-2012-5371/"> > + <p>Carefully crafted sequence of strings can cause a denial of service > + attack on the service that parses the sequence to create a Hash > + object by using the strings as keys. For instance, this > + vulnerability affects web application that parses the JSON data > + sent from untrusted entity.</p> > + <p>This vulnerability is similar to CVS-2011-4815 for ruby 1.8.7. ruby > + 1.9 versions were using modified MurmurHash function but it's > + reported that there is a way to create sequence of strings that > + collide their hash values each other. This fix changes the Hash > + function of String object from the MurmurHash to SipHash 2-4.</p> > + </blockquote> > + </body> > + </description> > + <references> > + <cvename>CVE-2012-5371</cvename> > + <url>http://www.ruby-lang.org/en/news/2012/11/09/ruby19-hashdos-cve-2012-5371/</url> > + </references> > + <dates> > + <discovery>2012-11-10</discovery> > + <entry>2012-11-10</entry> > + </dates> > + </vuln> > + > <vuln vid="152e4c7e-2a2e-11e2-99c7-00a0d181e71d"> > <topic>tomcat -- authentication weaknesses</topic> > <affects> > -- Regards, Bryan Drewery bdrewery@freenode/EFNet
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?509E6DD0.6070403>