Lucene search

K
mageiaGentoo FoundationMGASA-2014-0443
HistoryNov 14, 2014 - 3:57 a.m.

Updated ruby packages fix CVE-2014-8080

2014-11-1403:57:44
Gentoo Foundation
advisories.mageia.org
8

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.095 Low

EPSS

Percentile

94.7%

Updated ruby packages fix security vulnerability: Due to unrestricted entity expansion, when reading text nodes from an XML document, the REXML parser in Ruby can be coerced into allocating extremely large string objects which can consume all of the memory on a machine, causing a denial of service (CVE-2014-8080). The Mageia 3 ruby package has been updated to 1.9.3-p550 and the Mageia 4 ruby package has been updated to 2.0.0-p594 to fix this issue and several other bugs.

OSVersionArchitecturePackageVersionFilename
Mageia3noarchruby< 1.9.3.p550-1ruby-1.9.3.p550-1.mga3
Mageia4noarchruby< 2.0.0.p594-1ruby-2.0.0.p594-1.mga4

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.095 Low

EPSS

Percentile

94.7%