View | Details | Raw Unified | Return to bug 245023
Collapse All | Expand All

(-)security/vuxml/vuln.xml (+40 lines)
Lines 58-63 Link Here
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="40194e1c-6d89-11ea-8082-80ee73419af3">
62
    <topic>rubygem-json -- Unsafe Objection Creation Vulnerability in JSON (Additional fix)</topic>
63
    <affects>
64
      <package>
65
	<name>rubygem-json</name>
66
	<range><le>2.3.0</le></range>
67
      </package>
68
    </affects>
69
    <description>
70
      <body xmlns="http://www.w3.org/1999/xhtml">
71
	<blockquote cite="https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663/">
72
	  <p>When parsing certain JSON documents, the json gem (including the
73
	    one bundled with Ruby) can be coerced into creating arbitrary objects
74
	    in the target system.</p>
75
	  <p>This is the same issue as CVE-2013-0269. The previous fix was incomplete,
76
	     which addressed JSON.parse(user_input), but didn’t address some other
77
	     styles of JSON parsing including JSON(user_input) and
78
	     JSON.parse(user_input, nil).</p>
79
	  <p>See CVE-2013-0269 in detail. Note that the issue was exploitable to
80
	    cause a Denial of Service by creating many garbage-uncollectable
81
	    Symbol objects, but this kind of attack is no longer valid because
82
	    Symbol objects are now garbage-collectable. However, creating arbitrary
83
	    bjects may cause severe security consequences depending upon the
84
	    application code.</p>
85
	  <p>Please update the json gem to version 2.3.0 or later. You can use
86
	     gem update json to update it. If you are using bundler, please add
87
	     gem "json", "&gt;= 2.3.0" to your Gemfile.</p>
88
	</blockquote>
89
      </body>
90
    </description>
91
    <references>
92
      <url>https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663/</url>
93
      <cvename>CVE-2020-10663</cvename>
94
    </references>
95
    <dates>
96
      <discovery>2020-03-19</discovery>
97
      <entry>2020-03-24</entry>
98
    </dates>
99
  </vuln>
100
61
  <vuln vid="6b90acba-6a0a-11ea-92ab-00163e433440">
101
  <vuln vid="6b90acba-6a0a-11ea-92ab-00163e433440">
62
    <topic>FreeBSD -- Kernel memory disclosure with nested jails</topic>
102
    <topic>FreeBSD -- Kernel memory disclosure with nested jails</topic>
63
    <affects>
103
    <affects>

Return to bug 245023