Lines 58-63
Link Here
|
58 |
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.) |
58 |
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.) |
59 |
--> |
59 |
--> |
60 |
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> |
60 |
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> |
|
|
61 |
<vuln vid="0c853462-e484-11e9-ad70-08002743b791"> |
62 |
<topic>ruby -- multiple vulnerabilities</topic> |
63 |
<affects> |
64 |
<package> |
65 |
<name>ruby</name> |
66 |
<range><ge>2.4.0,1</ge><lt>2.4.8,1</lt></range> |
67 |
<range><ge>2.5.0,1</ge><lt>2.5.7,1</lt></range> |
68 |
<range><ge>2.6.0,1</ge><lt>2.6.5,1</lt></range> |
69 |
</package> |
70 |
</affects> |
71 |
<description> |
72 |
<body xmlns="http://www.w3.org/1999/xhtml"> |
73 |
<p>ooooooo_q reports:</p> |
74 |
<blockquote cite="https://www.ruby-lang.org/en/news/2019/10/01/nul-injection-file-fnmatch-cve-2019-15845/"> |
75 |
<p>A NUL injection vulnerability of Ruby built-in methods (File.fnmatch and File.fnmatch?) was found. An attacker who has the control of the path pattern parameter could exploit this vulnerability to make path matching pass despite the intention of the program author</p> |
76 |
</blockquote> |
77 |
<p>358 reports:</p> |
78 |
<blockquote cite="https://www.ruby-lang.org/en/news/2019/10/01/webrick-regexp-digestauth-dos-cve-2019-16201/"> |
79 |
<p>Regular expression denial of service vulnerability of WEBrickâs Digest authentication module was found. An attacker can exploit this vulnerability to cause an effective denial of service against a WEBrick service.</p> |
80 |
</blockquote> |
81 |
<p>znz reports:</p> |
82 |
<blockquote cite="https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254/"> |
83 |
<p>There is an HTTP response splitting vulnerability in WEBrick bundled with Ruby.</p> |
84 |
</blockquote> |
85 |
<p>ooooooo_q reports:</p> |
86 |
<blockquote cite="https://www.ruby-lang.org/en/news/2019/10/01/code-injection-shell-test-cve-2019-16255/"> |
87 |
<p>A code injection vulnerability of Shell#[] and Shell#test in a standard library (lib/shell.rb) was found.</p> |
88 |
</blockquote> |
89 |
</body> |
90 |
</description> |
91 |
<references> |
92 |
<url>https://www.ruby-lang.org/en/news/2019/10/01/nul-injection-file-fnmatch-cve-2019-15845/</url> |
93 |
<url>https://www.ruby-lang.org/en/news/2019/10/01/webrick-regexp-digestauth-dos-cve-2019-16201/</url> |
94 |
<url>https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254/</url> |
95 |
<url>https://www.ruby-lang.org/en/news/2019/10/01/code-injection-shell-test-cve-2019-16255/</url> |
96 |
<cvename>CVE-2019-15845</cvename> |
97 |
<cvename>CVE-2019-16201</cvename> |
98 |
<cvename>CVE-2019-16254</cvename> |
99 |
<cvename>CVE-2019-16255</cvename> |
100 |
</references> |
101 |
<dates> |
102 |
<discovery>2019-10-01</discovery> |
103 |
<entry>2019-10-01</entry> |
104 |
</dates> |
105 |
</vuln> |
106 |
|
61 |
<vuln vid="e917caba-e291-11e9-89f1-152fed202bb7"> |
107 |
<vuln vid="e917caba-e291-11e9-89f1-152fed202bb7"> |
62 |
<topic>Exim -- heap-based buffer overflow in string_vformat leading to RCE</topic> |
108 |
<topic>Exim -- heap-based buffer overflow in string_vformat leading to RCE</topic> |
63 |
<affects> |
109 |
<affects> |