{
  "threat_severity" : "Moderate",
  "public_date" : "2012-11-09T00:00:00Z",
  "bugzilla" : {
    "description" : "ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001)",
    "id" : "875236",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=875236"
  },
  "cvss" : {
    "cvss_base_score" : "5.0",
    "cvss_scoring_vector" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
    "status" : "verified"
  },
  "details" : [ "Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815." ],
  "statement" : "Not vulnerable. This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5 and 6.",
  "affected_release" : [ {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "graphviz-0:2.26.0-10.el6"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "openshift-console-0:0.0.16-1.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "openshift-origin-broker-0:1.0.11-1.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "openshift-origin-broker-util-0:1.0.15-1.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "openshift-origin-cartridge-cron-1.4-0:1.0.3-1.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "openshift-origin-cartridge-diy-0.1-0:1.0.3-1.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "openshift-origin-cartridge-haproxy-1.4-0:1.0.4-1.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "openshift-origin-cartridge-jbosseap-6.0-0:1.0.4-1.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "openshift-origin-cartridge-jbossews-1.0-0:1.0.13-1.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "openshift-origin-cartridge-jenkins-1.4-0:1.0.2-1.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "openshift-origin-cartridge-jenkins-client-1.4-0:1.0.2-1.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "openshift-origin-cartridge-mysql-5.1-0:1.0.5-1.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "openshift-origin-cartridge-perl-5.10-0:1.0.3-1.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "openshift-origin-cartridge-php-5.3-0:1.0.5-1.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "openshift-origin-cartridge-postgresql-8.4-0:1.0.3-2.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "openshift-origin-cartridge-ruby-1.8-0:1.0.7-1.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "openshift-origin-cartridge-ruby-1.9-scl-0:1.0.8-1.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "openshift-origin-msg-node-mcollective-0:1.0.3-1.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "php-0:5.3.3-22.el6"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "ruby193-ruby-0:1.9.3.327-25.el6"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "ruby193-rubygem-actionpack-1:3.2.8-3.el6"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "ruby193-rubygem-activemodel-0:3.2.8-2.el6"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "ruby193-rubygem-activerecord-1:3.2.8-3.el6"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "ruby193-rubygem-railties-0:3.2.8-2.el6"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "ruby193-rubygem-ruby_parser-0:2.3.1-3.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "rubygem-actionpack-1:3.0.13-4.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "rubygem-activemodel-0:3.0.13-3.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "rubygem-activerecord-1:3.0.13-5.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "rubygem-bson-0:1.8.1-2.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "rubygem-mongo-0:1.8.1-2.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "rubygem-openshift-origin-auth-remote-user-0:1.0.5-1.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "rubygem-openshift-origin-console-0:1.0.10-1.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "rubygem-openshift-origin-controller-0:1.0.12-1.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "rubygem-openshift-origin-node-0:1.0.11-1.el6op"
  }, {
    "product_name" : "RHEL 6 Version of OpenShift Enterprise",
    "release_date" : "2013-02-28T00:00:00Z",
    "advisory" : "RHSA-2013:0582",
    "cpe" : "cpe:/a:redhat:openshift:1::el6",
    "package" : "rubygem-ruby_parser-0:2.0.4-6.el6op"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2012-5371\nhttps://nvd.nist.gov/vuln/detail/CVE-2012-5371" ],
  "name" : "CVE-2012-5371",
  "csaw" : false
}