Lucene search

K
mageiaGentoo FoundationMGASA-2014-0472
HistoryNov 21, 2014 - 3:44 p.m.

Updated ruby packages fix security vulnerabilities

2014-11-2115:44:16
Gentoo Foundation
advisories.mageia.org
18

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.13 Low

EPSS

Percentile

95.6%

Will Wood discovered that Ruby incorrectly handled the encodes() function. An attacker could possibly use this issue to cause Ruby to crash, resulting in a denial of service, or possibly execute arbitrary code. The default compiler options for affected releases should reduce the vulnerability to a denial of service (CVE-2014-4975). Due to an incomplete fix for CVE-2014-8080, 100% CPU utilization can occur as a result of recursive expansion with an empty String. When reading text nodes from an XML document, the REXML parser in Ruby can be coerced into allocating extremely large string objects which can consume all of the memory on a machine, causing a denial of service (CVE-2014-8090).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchruby< 1.9.3.p551-1ruby-1.9.3.p551-1.mga3
Mageia4noarchruby< 2.0.0.p598-1ruby-2.0.0.p598-1.mga4

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.13 Low

EPSS

Percentile

95.6%