Name | CVE-2014-6438 |
Description | The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-275-1 |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
ruby1.8 | source | (unstable) | (not affected) | |||
ruby1.9.1 | source | squeeze | 1.9.2.0-2+deb6u6 | DLA-275-1 | ||
ruby1.9.1 | source | (unstable) | 1.9.3.0-1 |
- ruby1.8 <not-affected> (Vulnerable code not present)
https://www.ruby-lang.org/en/news/2014/08/19/ruby-1-9-2-p330-released/
https://github.com/ruby/www.ruby-lang.org/issues/817
https://github.com/ruby/ruby/commit/5082e91876502a2f3dde862406a0efe9f85afcdb
https://github.com/ruby/ruby/commit/7b9354af8805c02ed968765abe300162e0fcc943
CVE assignment is specific to ruby 1.9.x series?