blob: 4f66a89ffa4f25437477d327cb0a867fedf7ca99 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200605-11">
<title>Ruby: Denial of Service</title>
Ruby WEBrick and XMLRPC servers are vulnerable to Denial of Service.
<product type="ebuild">ruby</product>
<announced>May 10, 2006</announced>
<revised>May 10, 2006: 01</revised>
<package name="dev-lang/ruby" auto="yes" arch="*">
<unaffected range="ge">1.8.4-r1</unaffected>
<vulnerable range="lt">1.8.4-r1</vulnerable>
Ruby is an interpreted scripting language for quick and easy
object-oriented programming. It comes bundled with HTTP ("WEBrick") and
XMLRPC server objects.
Ruby uses blocking sockets for WEBrick and XMLRPC servers.
<impact type="normal">
An attacker could send large amounts of data to an affected server
to block the socket and thus deny other connections to the server.
There is no known workaround at this time.
All Ruby users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/ruby-1.8.4-r1&quot;</code>
<uri link="">CVE-2006-1931</uri>
<uri link="">Ruby release announcement</uri>
<metadata tag="submitter" timestamp="Mon, 08 May 2006 06:23:42 +0000">
<metadata tag="bugReady" timestamp="Mon, 08 May 2006 13:21:34 +0000">