Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2014-8080

Published: 29 October 2014

The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.

Priority

Medium

Status

Package Release Status
ruby1.8
Launchpad, Ubuntu, Debian
lucid Ignored
(end of life)
precise
Released (1.8.7.352-2ubuntu1.5)
trusty Does not exist

upstream Needs triage

utopic Does not exist

vivid Does not exist

wily Does not exist

ruby1.9
Launchpad, Ubuntu, Debian
lucid Ignored
(end of life)
maverick Does not exist

precise Does not exist

trusty Does not exist

upstream Needs triage

utopic Does not exist

vivid Does not exist

wily Does not exist

ruby1.9.1
Launchpad, Ubuntu, Debian
lucid Ignored
(end of life)
precise
Released (1.9.3.0-1ubuntu2.9)
trusty
Released (1.9.3.484-2ubuntu1.1)
upstream Needs triage

utopic Ignored
(end of life)
vivid Ignored
(end of life)
wily Does not exist

ruby2.0
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

trusty
Released (2.0.0.484-1ubuntu2.1)
upstream Needs triage

utopic
Released (2.0.0.484+really457-3ubuntu1.1)
vivid Does not exist

wily Does not exist

ruby2.1
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

trusty Does not exist

upstream Needs triage

utopic
Released (2.1.2-2ubuntu1.1)
vivid
Released (2.1.2-2ubuntu2)
wily
Released (2.1.2-2ubuntu2)
Patches:
upstream: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=48161