Debian Security Advisory
DSA-3157-1 ruby1.9.1 -- security update
- Date Reported:
- 09 Feb 2015
- Affected Packages:
- ruby1.9.1
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2014-4975, CVE-2014-8080, CVE-2014-8090.
- More information:
-
Multiple vulnerabilities were discovered in the interpreter for the Ruby language:
- CVE-2014-4975
The encodes() function in pack.c had an off-by-one error that could lead to a stack-based buffer overflow. This could allow remote attackers to cause a denial of service (crash) or arbitrary code execution.
- CVE-2014-8080,
CVE-2014-8090
The REXML parser could be coerced into allocating large string objects that could consume all available memory on the system. This could allow remote attackers to cause a denial of service (crash).
For the stable distribution (wheezy), these problems have been fixed in version 1.9.3.194-8.1+deb7u3.
For the upcoming stable distribution (jessie), these problems have been fixed in version 2.1.5-1 of the ruby2.1 source package.
For the unstable distribution (sid), these problems have been fixed in version 2.1.5-1 of the ruby2.1 source package.
We recommend that you upgrade your ruby1.9.1 packages.
- CVE-2014-4975