Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2014-1912

Опубликовано: 26 нояб. 2014
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2014-1912: ruby security update (MODERATE)

[2.0.0.353-22]

  • Fix REXML billion laughs attack via parameter entity expansion (CVE-2014-8080). Resolves: rhbz#1163998
  • REXML incomplete fix for CVE-2014-8080 (CVE-2014-8090). Resolves: rhbz#1163998

[2.0.0.353-21]

  • Fix off-by-one stack-based buffer overflow in the encodes() function (CVE-2014-4975) Resolves: rhbz#1163998

[2.0.0.353-21]

  • Fix FTBFS with new tzdata Related: rhbz#1163998

Обновленные пакеты

Oracle Linux 7

Oracle Linux x86_64

ruby

2.0.0.353-22.el7_0

ruby-devel

2.0.0.353-22.el7_0

ruby-doc

2.0.0.353-22.el7_0

ruby-irb

2.0.0.353-22.el7_0

ruby-libs

2.0.0.353-22.el7_0

ruby-tcltk

2.0.0.353-22.el7_0

rubygem-bigdecimal

1.2.0-22.el7_0

rubygem-io-console

0.4.2-22.el7_0

rubygem-json

1.7.7-22.el7_0

rubygem-minitest

4.3.2-22.el7_0

rubygem-psych

2.0.0-22.el7_0

rubygem-rake

0.9.6-22.el7_0

rubygem-rdoc

4.0.0-22.el7_0

rubygems

2.0.14-22.el7_0

rubygems-devel

2.0.14-22.el7_0

Связанные уязвимости

oracle-oval
больше 9 лет назад

ELSA-2014-1913: ruby193-ruby security update (MODERATE)

oracle-oval
почти 11 лет назад

ELSA-2014-1911: ruby security update (MODERATE)

ubuntu
почти 11 лет назад

The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.

redhat
почти 11 лет назад

The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.

nvd
почти 11 лет назад

The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.