FreeBSD Bugzilla – Attachment 207993 Details for
Bug 240980
security/vuxml: Document multiple vulnerabilities in Ruby.
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
[patch]
Patch file
security_vuxml.patch (text/plain), 2.89 KB, created by
Yasuhiro Kimura
on 2019-10-01 20:14:01 UTC
(
hide
)
Description:
Patch file
Filename:
MIME Type:
Creator:
Yasuhiro Kimura
Created:
2019-10-01 20:14:01 UTC
Size:
2.89 KB
patch
obsolete
>Index: vuln.xml >=================================================================== >--- vuln.xml (revision 513343) >+++ vuln.xml (working copy) >@@ -58,6 +58,52 @@ > * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) > --> > <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> >+ <vuln vid="0c853462-e484-11e9-ad70-08002743b791"> >+ <topic>ruby -- multiple vulnerabilities</topic> >+ <affects> >+ <package> >+ <name>ruby</name> >+ <range><ge>2.4.0,1</ge><lt>2.4.8,1</lt></range> >+ <range><ge>2.5.0,1</ge><lt>2.5.7,1</lt></range> >+ <range><ge>2.6.0,1</ge><lt>2.6.5,1</lt></range> >+ </package> >+ </affects> >+ <description> >+ <body xmlns="http://www.w3.org/1999/xhtml"> >+ <p>ooooooo_q reports:</p> >+ <blockquote cite="https://www.ruby-lang.org/en/news/2019/10/01/nul-injection-file-fnmatch-cve-2019-15845/"> >+ <p>A NUL injection vulnerability of Ruby built-in methods (File.fnmatch and File.fnmatch?) was found. An attacker who has the control of the path pattern parameter could exploit this vulnerability to make path matching pass despite the intention of the program author</p> >+ </blockquote> >+ <p>358 reports:</p> >+ <blockquote cite="https://www.ruby-lang.org/en/news/2019/10/01/webrick-regexp-digestauth-dos-cve-2019-16201/"> >+ <p>Regular expression denial of service vulnerability of WEBrickâs Digest authentication module was found. An attacker can exploit this vulnerability to cause an effective denial of service against a WEBrick service.</p> >+ </blockquote> >+ <p>znz reports:</p> >+ <blockquote cite="https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254/"> >+ <p>There is an HTTP response splitting vulnerability in WEBrick bundled with Ruby.</p> >+ </blockquote> >+ <p>ooooooo_q reports:</p> >+ <blockquote cite="https://www.ruby-lang.org/en/news/2019/10/01/code-injection-shell-test-cve-2019-16255/"> >+ <p>A code injection vulnerability of Shell#[] and Shell#test in a standard library (lib/shell.rb) was found.</p> >+ </blockquote> >+ </body> >+ </description> >+ <references> >+ <url>https://www.ruby-lang.org/en/news/2019/10/01/nul-injection-file-fnmatch-cve-2019-15845/</url> >+ <url>https://www.ruby-lang.org/en/news/2019/10/01/webrick-regexp-digestauth-dos-cve-2019-16201/</url> >+ <url>https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254/</url> >+ <url>https://www.ruby-lang.org/en/news/2019/10/01/code-injection-shell-test-cve-2019-16255/</url> >+ <cvename>CVE-2019-15845</cvename> >+ <cvename>CVE-2019-16201</cvename> >+ <cvename>CVE-2019-16254</cvename> >+ <cvename>CVE-2019-16255</cvename> >+ </references> >+ <dates> >+ <discovery>2019-10-01</discovery> >+ <entry>2019-10-01</entry> >+ </dates> >+ </vuln> >+ > <vuln vid="e917caba-e291-11e9-89f1-152fed202bb7"> > <topic>Exim -- heap-based buffer overflow in string_vformat leading to RCE</topic> > <affects>
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 240980
: 207993