SB2020022033 - Input validation error in Fedoraproject Fedora
Published: February 20, 2020 Updated: August 8, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2015-4411)
The vulnerability allows remote attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (worker resource consumption) via a crafted string.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161964.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161987.html
- http://www.openwall.com/lists/oss-security/2015/06/06/3
- http://www.securityfocus.com/bid/75045
- https://bugzilla.redhat.com/show_bug.cgi?id=1229706
- https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999
- https://github.com/mongodb/bson-ruby/commit/fef6f75413511d653c76bf924a932374a183a24f#diff-8c8558c185bbb548ccb5a6d6ac4bfee5R191
- https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7
- https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24
- https://homakov.blogspot.ru/2012/05/saferweb-injects-in-various-ruby.html
- https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html
- https://seclists.org/oss-sec/2015/q2/653
- https://security-tracker.debian.org/tracker/CVE-2015-4411
- https://www.securityfocus.com/bid/75045