Bug 1159927 (CVE-2014-8090)
| Summary: | CVE-2014-8090 ruby: REXML incomplete fix for CVE-2014-8080 | ||||||
|---|---|---|---|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Tomas Hoger <thoger> | ||||
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
| Status: | CLOSED ERRATA | QA Contact: | |||||
| Severity: | medium | Docs Contact: | |||||
| Priority: | medium | ||||||
| Version: | unspecified | CC: | bcourt, bkearney, carnil, cbillett, ccoleman, dajohnso, dmcphers, gmccullo, jialiu, jmatthew, joelsmith, jokerman, jorton, jprause, jvlcek, lmeyer, mmaslano, mmccomas, mmccune, mmcgrath, ohadlevy, rchan, security-response-team, tomckay, tsanders, vondruch, weli, xlecauch | ||||
| Target Milestone: | --- | Keywords: | Security | ||||
| Target Release: | --- | ||||||
| Hardware: | All | ||||||
| OS: | Linux | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | ruby 1.9.3p551, ruby 2.0.0p598, ruby 2.1.5, jruby 1.7.16.2 | Doc Type: | Bug Fix | ||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2021-10-20 10:47:45 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Bug Depends On: | 1163993, 1163994, 1163998, 1164000, 1164004, 1164005, 1165367, 1542174, 1542175, 1542176, 1542177 | ||||||
| Bug Blocks: | 1157711 | ||||||
| Attachments: |
|
||||||
|
Description
Tomas Hoger
2014-11-03 15:48:38 UTC
Created attachment 953157 [details]
Upstream fix
External References: https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/ Fixed upstream in 1.9.3p551, 2.0.0p598, and 2.1.5. Upstream commit: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=48402 Statement: Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/ Red Hat JBoss SOA Platform 5 is now in Maintenance Support phase receiving only qualified Important and Critical impact security fixes; and Red Hat JBoss SOA Platform 4.3 is now in Extended Life Support phase receiving only Critical impact security fixes. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware Product Life Cycle: https://access.redhat.com/support/policy/updates/jboss_notes/ This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2014:1911 https://rhn.redhat.com/errata/RHSA-2014-1911.html This issue has been addressed in the following products: Red Hat Software Collections 1 for Red Hat Enterprise Linux 7 Red Hat Software Collections 1 for Red Hat Enterprise Linux 6 Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.5 EUS Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.4 EUS Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.6 EUS Via RHSA-2014:1914 https://rhn.redhat.com/errata/RHSA-2014-1914.html This issue has been addressed in the following products: Red Hat Software Collections 1 for Red Hat Enterprise Linux 7 Red Hat Software Collections 1 for Red Hat Enterprise Linux 6 Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.5 EUS Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.4 EUS Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.6 EUS Via RHSA-2014:1913 https://rhn.redhat.com/errata/RHSA-2014-1913.html This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2014:1912 https://rhn.redhat.com/errata/RHSA-2014-1912.html JRuby was fixed upstream in 1.7.16.2: http://jruby.org/2014/12/08/jruby-1-7-16-2.html Created jruby tracking bugs for this issue: Affects: fedora-all [bug 1542174] Created ruby tracking bugs for this issue: Affects: fedora-all [bug 1542175] (In reply to Kurt Seifried from comment #17) > Created ruby tracking bugs for this issue: > > Affects: fedora-all [bug 1542175] Pardon me, but what is this? Does the problem reappeared in Ruby 2.5? |