diff options
author | swills <swills@FreeBSD.org> | 2013-02-25 02:21:02 +0800 |
---|---|---|
committer | swills <swills@FreeBSD.org> | 2013-02-25 02:21:02 +0800 |
commit | 9e51bdc2d74156aaf328886b08e70b92d4335120 (patch) | |
tree | 7ff3f0532fad6540908cbf12d1724e7ee2c95fd7 /security | |
parent | f17b5c3389a988cbb552e825189255ba629e400d (diff) | |
download | freebsd-ports-gnome-9e51bdc2d74156aaf328886b08e70b92d4335120.tar.gz freebsd-ports-gnome-9e51bdc2d74156aaf328886b08e70b92d4335120.tar.zst freebsd-ports-gnome-9e51bdc2d74156aaf328886b08e70b92d4335120.zip |
- Document Ruby REXML DoS
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 33 |
1 files changed, 33 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 35de71ec6a9b..af5b90c7980a 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -51,6 +51,39 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="844cf3f5-9259-4b3e-ac9e-13ca17333ed7"> + <topic>ruby -- DoS vulnerability in REXML</topic> + <affects> + <package> + <name>ruby</name> + <range><ge>1.9,1</ge><lt>1.9.3.392,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Ruby developers report:</p> + <blockquote cite="http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"> + <p>Unrestricted entity expansion can lead to a DoS vulnerability in + REXML. (The CVE identifier will be assigned later.) We strongly + recommend to upgrade ruby. + </p> + <p>When reading text nodes from an XML document, the REXML parser can + be coerced in to allocating extremely large string objects which + can consume all of the memory on a machine, causing a denial of + service. + </p> + </blockquote> + </body> + </description> + <references> + <url>http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/</url> + </references> + <dates> + <discovery>2013-02-22</discovery> + <entry>2013-02-24</entry> + </dates> + </vuln> + <vuln vid="e1aa3bdd-839a-4a77-8617-cca439a8f9fc"> <topic>rubygem-ruby_parser -- insecure tmp file usage</topic> <affects> |