Lucene search

K
centosCentOS ProjectCESA-2014:1912
HistoryDec 01, 2014 - 1:45 p.m.

ruby, rubygem, rubygems security update

2014-12-0113:45:48
CentOS Project
lists.centos.org
56

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.154 Low

EPSS

Percentile

95.8%

CentOS Errata and Security Advisory CESA-2014:1912

Ruby is an extensible, interpreted, object-oriented, scripting language.
It has features to process text files and to perform system management
tasks.

Multiple denial of service flaws were found in the way the Ruby REXML XML
parser performed expansion of parameter entities. A specially crafted XML
document could cause REXML to use an excessive amount of CPU and memory.
(CVE-2014-8080, CVE-2014-8090)

A stack-based buffer overflow was found in the implementation of the Ruby
Array pack() method. When performing base64 encoding, a single byte could
be written past the end of the buffer, possibly causing Ruby to crash.
(CVE-2014-4975)

The CVE-2014-8090 issue was discovered by Red Hat Product Security.

All ruby users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. All running instances
of Ruby need to be restarted for this update to take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2014-December/082954.html

Affected packages:
ruby
ruby-devel
ruby-doc
ruby-irb
ruby-libs
ruby-tcltk
rubygem-bigdecimal
rubygem-io-console
rubygem-json
rubygem-minitest
rubygem-psych
rubygem-rake
rubygem-rdoc
rubygems
rubygems-devel

Upstream details at:
https://access.redhat.com/errata/RHSA-2014:1912

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.154 Low

EPSS

Percentile

95.8%