CVE-2017-15928

NameCVE-2017-15928
DescriptionIn the Ox gem 2.8.0 for Ruby, the process crashes with a segmentation fault when a crafted input is supplied to parse_obj. NOTE: the vendor has stated "Ox should handle the error more gracefully" but has not confirmed a security implication.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs881445

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ruby-ox (PTS)buster2.10.0-1fixed
bullseye2.11.0-2fixed
bookworm2.14.9-1fixed
sid, trixie2.14.17-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ruby-oxsourcejessie2.1.1-2+deb8u1
ruby-oxsourcestretch2.1.1-2+deb9u1
ruby-oxsource(unstable)2.8.2-1881445

Notes

https://github.com/ohler55/ox/issues/194
https://github.com/ohler55/ox/commit/e4565dbc167f0d38c3f93243d7a4fcfc391cbfc8

Search for package or bug name: Reporting problems