Your submission was sent successfully! Close

CVE-2014-8080

Published: 29 October 2014

The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.

Priority

Medium

Status

Package Release Status
ruby1.8
Launchpad, Ubuntu, Debian
lucid Ignored
(reached end-of-life)
precise
Released (1.8.7.352-2ubuntu1.5)
trusty Does not exist

upstream Needs triage

utopic Does not exist

vivid Does not exist

wily Does not exist

ruby1.9
Launchpad, Ubuntu, Debian
lucid Ignored
(reached end-of-life)
maverick Does not exist

precise Does not exist

trusty Does not exist

upstream Needs triage

utopic Does not exist

vivid Does not exist

wily Does not exist

ruby1.9.1
Launchpad, Ubuntu, Debian
lucid Ignored
(reached end-of-life)
precise
Released (1.9.3.0-1ubuntu2.9)
trusty Does not exist
(trusty was released [1.9.3.484-2ubuntu1.1])
upstream Needs triage

utopic Ignored
(reached end-of-life)
vivid Ignored
(reached end-of-life)
wily Does not exist

ruby2.0
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

trusty Does not exist
(trusty was released [2.0.0.484-1ubuntu2.1])
upstream Needs triage

utopic
Released (2.0.0.484+really457-3ubuntu1.1)
vivid Does not exist

wily Does not exist

ruby2.1
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

trusty Does not exist

upstream Needs triage

utopic
Released (2.1.2-2ubuntu1.1)
vivid
Released (2.1.2-2ubuntu2)
wily
Released (2.1.2-2ubuntu2)
Patches:
upstream: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=48161