~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to active/CVE-2017-15928

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
Candidate: CVE-2017-15928
2
 
PublicDate: 2017-10-27
3
 
References:
4
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15928
5
 
 https://github.com/ohler55/ox/issues/194
6
 
 https://rubygems.org/gems/ox/versions/2.8.0
7
 
Description:
8
 
 In the Ox gem 2.8.0 for Ruby, the process crashes with a segmentation fault
9
 
 when a crafted input is supplied to parse_obj. NOTE: the vendor has stated
10
 
 "Ox should handle the error more gracefully" but has not confirmed a
11
 
 security implication.
12
 
Ubuntu-Description:
13
 
Notes:
14
 
Bugs:
15
 
Priority: untriaged
16
 
Discovered-by:
17
 
Assigned-to:
18
 
 
19
 
 
20
 
Patches_ruby-ox:
21
 
upstream_ruby-ox: needs-triage
22
 
precise/esm_ruby-ox: DNE
23
 
trusty_ruby-ox: needs-triage
24
 
xenial_ruby-ox: needs-triage
25
 
zesty_ruby-ox: ignored (reached end-of-life)
26
 
artful_ruby-ox: needs-triage
27
 
bionic_ruby-ox: needs-triage
28
 
devel_ruby-ox: needs-triage