A denial of service flaw was found in the way ruby-openid, a library for verifying and serving OpenID identities, performed processing of certain XML files. An OpenID provider could provide a specially-crafted XML file that, when processed would lead to excessive CPU consumption (denial of service). References: [1] https://github.com/openid/ruby-openid/pull/43 [2] https://bugzilla.novell.com/show_bug.cgi?id=804717 [3] http://www.openwall.com/lists/oss-security/2013/03/01/5 [4] http://www.openwall.com/lists/oss-security/2013/03/03/8 Relevant upstream patch: [5] https://github.com/openid/ruby-openid/commit/a3693cef06049563f5b4e4824f4d3211288508ed
This issue affects the versions of the ruby-openid package, as shipped with Fedora release of 17 and 18. Please schedule an update.
Created ruby-openid tracking bugs for this issue Affects: fedora-all [bug 918135]
For the record, this was fixed upstream in version 2.2.2 of the ruby-openid gem. This package has been renamed to rubygem-ruby-openid. https://admin.fedoraproject.org/updates/rubygem-ruby-openid
rubygem-ruby-openid-2.3.0-3.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
rubygem-ruby-openid-2.3.0-3.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.