Lucene search

K
mageiaGentoo FoundationMGASA-2014-0003
HistoryJan 06, 2014 - 5:02 a.m.

Updated ruby package fixes security vulnerability

2014-01-0605:02:29
Gentoo Foundation
advisories.mageia.org
10

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.045 Low

EPSS

Percentile

92.4%

Charlie Somerville discovered that Ruby incorrectly handled floating point number conversion. An attacker could possibly use this issue with an application that converts text to floating point numbers to cause the application to crash, resulting in a denial of service, or possibly execute arbitrary code (CVE-2013-4164).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchruby< 1.9.3.p484-1ruby-1.9.3.p484-1.mga3

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.045 Low

EPSS

Percentile

92.4%