View | Details | Raw Unified | Return to bug 240980
Collapse All | Expand All

(-)vuln.xml (+46 lines)
Lines 58-63 Link Here
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="0c853462-e484-11e9-ad70-08002743b791">
62
    <topic>ruby -- multiple vulnerabilities</topic>
63
    <affects>
64
      <package>
65
	<name>ruby</name>
66
	<range><ge>2.4.0,1</ge><lt>2.4.8,1</lt></range>
67
	<range><ge>2.5.0,1</ge><lt>2.5.7,1</lt></range>
68
	<range><ge>2.6.0,1</ge><lt>2.6.5,1</lt></range>
69
      </package>
70
    </affects>
71
    <description>
72
      <body xmlns="http://www.w3.org/1999/xhtml">
73
	<p>ooooooo_q  reports:</p>
74
	<blockquote cite="https://www.ruby-lang.org/en/news/2019/10/01/nul-injection-file-fnmatch-cve-2019-15845/">
75
	  <p>A NUL injection vulnerability of Ruby built-in methods (File.fnmatch and File.fnmatch?) was found. An attacker who has the control of the path pattern parameter could exploit this vulnerability to make path matching pass despite the intention of the program author</p>
76
	</blockquote>
77
	<p>358 reports:</p>
78
	<blockquote cite="https://www.ruby-lang.org/en/news/2019/10/01/webrick-regexp-digestauth-dos-cve-2019-16201/">
79
	  <p>Regular expression denial of service vulnerability of WEBrick’s Digest authentication module was found. An attacker can exploit this vulnerability to cause an effective denial of service against a WEBrick service.</p>
80
	</blockquote>
81
	<p>znz reports:</p>
82
	<blockquote cite="https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254/">
83
	  <p>There is an HTTP response splitting vulnerability in WEBrick bundled with Ruby.</p>
84
	</blockquote>
85
	<p>ooooooo_q reports:</p>
86
	<blockquote cite="https://www.ruby-lang.org/en/news/2019/10/01/code-injection-shell-test-cve-2019-16255/">
87
	  <p>A code injection vulnerability of Shell#[] and Shell#test in a standard library (lib/shell.rb) was found.</p>
88
	</blockquote>
89
      </body>
90
    </description>
91
    <references>
92
      <url>https://www.ruby-lang.org/en/news/2019/10/01/nul-injection-file-fnmatch-cve-2019-15845/</url>
93
      <url>https://www.ruby-lang.org/en/news/2019/10/01/webrick-regexp-digestauth-dos-cve-2019-16201/</url>
94
      <url>https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254/</url>
95
      <url>https://www.ruby-lang.org/en/news/2019/10/01/code-injection-shell-test-cve-2019-16255/</url>
96
      <cvename>CVE-2019-15845</cvename>
97
      <cvename>CVE-2019-16201</cvename>
98
      <cvename>CVE-2019-16254</cvename>
99
      <cvename>CVE-2019-16255</cvename>
100
    </references>
101
    <dates>
102
      <discovery>2019-10-01</discovery>
103
      <entry>2019-10-01</entry>
104
    </dates>
105
  </vuln>
106
61
  <vuln vid="e917caba-e291-11e9-89f1-152fed202bb7">
107
  <vuln vid="e917caba-e291-11e9-89f1-152fed202bb7">
62
    <topic>Exim -- heap-based buffer overflow in string_vformat leading to RCE</topic>
108
    <topic>Exim -- heap-based buffer overflow in string_vformat leading to RCE</topic>
63
    <affects>
109
    <affects>

Return to bug 240980