==========================================================================
Ubuntu Security Notice USN-2412-1
November 20, 2014
ruby1.8, ruby1.9.1, ruby2.0, ruby2.1 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS
Summary:
Ruby could be made to consume resources.
Software Description:
– ruby2.0: Object-oriented scripting language
– ruby2.1: Object-oriented scripting language
– ruby1.9.1: Object-oriented scripting language
– ruby1.8: Object-oriented scripting language
Details:
Tomas Hoger discovered that Ruby incorrectly handled XML entity expansion.
An attacker could use this flaw to cause Ruby to consume large amounts of
resources, resulting in a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.10:
libruby2.0 2.0.0.484+really457-3ubuntu1.2
libruby2.1 2.1.2-2ubuntu1.2
ruby2.0 2.0.0.484+really457-3ubuntu1.2
ruby2.1 2.1.2-2ubuntu1.2
Ubuntu 14.04 LTS:
libruby1.9.1 1.9.3.484-2ubuntu1.2
libruby2.0 2.0.0.484-1ubuntu2.2
ruby1.9.1 1.9.3.484-2ubuntu1.2
ruby2.0 2.0.0.484-1ubuntu2.2
Ubuntu 12.04 LTS:
libruby1.8 1.8.7.352-2ubuntu1.6
libruby1.9.1 1.9.3.0-1ubuntu2.10
ruby1.8 1.8.7.352-2ubuntu1.6
ruby1.9.1 1.9.3.0-1ubuntu2.10
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2412-1
CVE-2014-8090
Package Information:
https://launchpad.net/ubuntu/+source/ruby2.0/2.0.0.484+really457-3ubuntu1.2
https://launchpad.net/ubuntu/+source/ruby2.1/2.1.2-2ubuntu1.2
https://launchpad.net/ubuntu/+source/ruby1.9.1/1.9.3.484-2ubuntu1.2
https://launchpad.net/ubuntu/+source/ruby2.0/2.0.0.484-1ubuntu2.2
https://launchpad.net/ubuntu/+source/ruby1.8/1.8.7.352-2ubuntu1.6
https://launchpad.net/ubuntu/+source/ruby1.9.1/1.9.3.0-1ubuntu2.10
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=1rHT
—–END PGP SIGNATURE—–
—