Advisories ยป MGASA-2014-0472

Updated ruby packages fix security vulnerabilities

Publication date: 21 Nov 2014
Type: security
Affected Mageia releases : 3 , 4
CVE: CVE-2014-4975 , CVE-2014-8090

Description

Will Wood discovered that Ruby incorrectly handled the encodes() function.
An attacker could possibly use this issue to cause Ruby to crash, resulting
in a denial of service, or possibly execute arbitrary code. The default
compiler options for affected releases should reduce the vulnerability to a
denial of service (CVE-2014-4975).

Due to an incomplete fix for CVE-2014-8080, 100% CPU utilization can occur as
a result of recursive expansion with an empty String. When reading text nodes
from an XML document, the REXML parser in Ruby can be coerced into allocating
extremely large string objects which can consume all of the memory on a
machine, causing a denial of service (CVE-2014-8090).
                

References

SRPMS

3/core

4/core