Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2014-8090

Published: 14 November 2014

The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.

Priority

Medium

Status

Package Release Status
ruby1.8
Launchpad, Ubuntu, Debian
lucid Ignored
(end of life)
precise
Released (1.8.7.352-2ubuntu1.6)
trusty Does not exist

upstream Needs triage

utopic Does not exist

vivid Does not exist

wily Does not exist

ruby1.9.1
Launchpad, Ubuntu, Debian
lucid Ignored
(end of life)
precise
Released (1.9.3.0-1ubuntu2.10)
trusty
Released (1.9.3.484-2ubuntu1.2)
upstream Needs triage

utopic Ignored
(end of life)
vivid Ignored
(end of life)
wily Does not exist

Patches:
upstream: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=48406



ruby2.0
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

trusty
Released (2.0.0.484-1ubuntu2.2)
upstream Needs triage

utopic
Released (2.0.0.484+really457-3ubuntu1.2)
vivid Does not exist

wily Does not exist

Patches:

upstream: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=48403


ruby2.1
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

trusty Does not exist

upstream Needs triage

utopic
Released (2.1.2-2ubuntu1.2)
vivid
Released (2.1.2-2ubuntu3)
wily
Released (2.1.2-2ubuntu3)
Patches:


upstream: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=48402
upstream: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=48404