Bug 470252 - (CVE-2008-4310) CVE-2008-4310 ruby: Incomplete fix for CVE-2008-3656
CVE-2008-4310 ruby: Incomplete fix for CVE-2008-3656
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 461591 470262 472067
  Show dependency treegraph
Reported: 2008-11-06 08:56 EST by Jan Lieskovsky
Modified: 2008-12-17 04:01 EST (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2008-12-17 04:01:09 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
Proper patch to address CVE-2008-4310 issue. (1.11 KB, patch)
2008-11-06 09:06 EST, Jan Lieskovsky
no flags Details | Diff

  None (edit)
Description Jan Lieskovsky 2008-11-06 08:56:52 EST
Common Vulnerabilities and Exposures assigned an identifier CVE-2008-3656 to
the following vulnerability:

Algorithmic complexity vulnerability in WEBrick::HTTP::DefaultFileHandler in
WEBrick in Ruby 1.8.5 and earlier, 1.8.5 through 1.8.6-p286, 1.8.7 through
1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a
denial of service (CPU consumption) via a crafted HTTP request that is
processed by a backtracking regular expression.


Vincent Danen from LinSec discovered the original patch for this flaw, provided by Red Hat, did not properly address this flaw.
Comment 3 Jan Lieskovsky 2008-11-06 09:06:39 EST
Created attachment 322718 [details]
Proper patch to address CVE-2008-4310 issue.
Comment 6 Mark J. Cox (Product Security) 2008-12-04 10:28:34 EST
removing embargo ready for us to push an update to correct this issue.
Comment 7 Tomas Hoger 2008-12-17 02:57:17 EST
Further details about this issue can be found here:
Comment 8 Red Hat Product Security 2008-12-17 04:01:09 EST
This issue was addressed in:

Red Hat Enterprise Linux:

Note You need to log in before you can comment on or make changes to this bug.