CVE-2017-15928

NameCVE-2017-15928
DescriptionIn the Ox gem 2.8.0 for Ruby, the process crashes with a segmentation fault when a crafted input is supplied to parse_obj. NOTE: the vendor has stated "Ox should handle the error more gracefully" but has not confirmed a security implication.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs881445

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ruby-ox (PTS)jessie2.1.1-2+deb8u1fixed
stretch2.1.1-2+deb9u1fixed
buster2.10.0-1fixed
bullseye, sid2.11.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ruby-oxsource(unstable)2.8.2-1881445
ruby-oxsourcejessie2.1.1-2+deb8u1
ruby-oxsourcestretch2.1.1-2+deb9u1

Notes

https://github.com/ohler55/ox/issues/194
https://github.com/ohler55/ox/commit/e4565dbc167f0d38c3f93243d7a4fcfc391cbfc8

Search for package or bug name: Reporting problems