@@ -16,28 +16,32 @@ private mailing list. Reported problems will be published after fixes.
16
16
17
17
Here are recent issues.
18
18
19
+ * [ Entity expansion DoS vulnerability in REXML (XML bomb)] [ 1 ] published
20
+ at 22 Feb, 2013.
21
+ * [ Denial of Service and Unsafe Object Creation Vulnerability in JSON
22
+ (CVE-2013 -0269)] [ 2 ] published at 22 Feb, 2013.
19
23
* [ XSS exploit of RDoc documentation generated by rdoc
20
- (CVE-2013 -0256)] [ 1 ] published at 6 Feb, 2013.
21
- * [ Hash-flooding DoS vulnerability for ruby 1.9 (CVE-2012 -5371)] [ 2 ]
24
+ (CVE-2013 -0256)] [ 3 ] published at 6 Feb, 2013.
25
+ * [ Hash-flooding DoS vulnerability for ruby 1.9 (CVE-2012 -5371)] [ 4 ]
22
26
published at 10 Nov, 2012.
23
27
* [ Unintentional file creation caused by inserting a illegal NUL
24
- character] [ 3 ] published at 12 Oct, 2012.
28
+ character] [ 5 ] published at 12 Oct, 2012.
25
29
* [ $SAFE escaping vulnerability about Exception#to\_ s / NameError#to\_ s
26
- (CVE-2012 -4464, CVE-2012 -4466)] [ 4 ] published at 12 Oct, 2012.
30
+ (CVE-2012 -4464, CVE-2012 -4466)] [ 6 ] published at 12 Oct, 2012.
27
31
* [ Security Fix for RubyGems: SSL server verification failure for remote
28
- repository] [ 5 ] published at 20 Apr, 2012.
32
+ repository] [ 7 ] published at 20 Apr, 2012.
29
33
* [ Security Fix for Ruby OpenSSL module: Allow 0/n splitting as a
30
- prevention for the TLS BEAST attack] [ 6 ] published at 16 Feb, 2012.
34
+ prevention for the TLS BEAST attack] [ 8 ] published at 16 Feb, 2012.
31
35
* [ Denial of service attack was found for Ruby\' s Hash algorithm
32
- (CVE-2011 -4815)] [ 7 ] published at 28 Dec, 2011.
33
- * [ Exception methods can bypass $SAFE] [ 8 ] published at 18 Feb, 2011.
34
- * [ FileUtils is vulnerable to symlink race attacks] [ 9 ] published at 18
36
+ (CVE-2011 -4815)] [ 9 ] published at 28 Dec, 2011.
37
+ * [ Exception methods can bypass $SAFE] [ 10 ] published at 18 Feb, 2011.
38
+ * [ FileUtils is vulnerable to symlink race attacks] [ 11 ] published at 18
35
39
Feb, 2011.
36
- * [ XSS in WEBrick (CVE-2010 -0541)] [ 10 ] published at 16 Aug, 2010.
37
- * [ Buffer over-run in ARGF.inplace\_ mode=] [ 11 ] published at 2 Jul, 2010.
38
- * [ WEBrick has an Escape Sequence Injection vulnerability] [ 12 ] published
40
+ * [ XSS in WEBrick (CVE-2010 -0541)] [ 12 ] published at 16 Aug, 2010.
41
+ * [ Buffer over-run in ARGF.inplace\_ mode=] [ 13 ] published at 2 Jul, 2010.
42
+ * [ WEBrick has an Escape Sequence Injection vulnerability] [ 14 ] published
39
43
at 10 Jan, 2010
40
- * [ Heap overflow in String] [ 13 ] published at 7 Dec, 2009
44
+ * [ Heap overflow in String] [ 15 ] published at 7 Dec, 2009
41
45
* [ DoS vulnerability in
42
46
REXML] ( /en/news/2008/08/23/dos-vulnerability-in-rexml/ ) published at
43
47
23 Aug, 2008
@@ -64,16 +68,18 @@ Here are recent issues.
64
68
65
69
66
70
67
- [ 1] : http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256/
68
- [ 2] : http://www.ruby-lang.org/en/news/2012/11/09/ruby19-hashdos-cve-2012-5371/
69
- [ 3] : http://preview.ruby-lang.org/en/news/2012/10/12/poisoned-NUL-byte-vulnerability/
70
- [ 4] : http://www.ruby-lang.org/en/news/2012/10/12/cve-2012-4464-cve-2012-4466/
71
- [ 5] : http://www.ruby-lang.org/en/news/2012/04/20/ruby-1-9-3-p194-is-released/
72
- [ 6] : http://www.ruby-lang.org/en/news/2012/02/16/security-fix-for-ruby-openssl-module-allow-0n-splitting-as-a-prevention-for-the-tls-beast-attack-/
73
- [ 7] : http://www.ruby-lang.org/en/news/2011/12/28/denial-of-service-attack-was-found-for-rubys-hash-algorithm-cve-2011-4815/
74
- [ 8] : http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/
75
- [ 9] : http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/
76
- [ 10] : http://www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/
77
- [ 11] : http://www.ruby-lang.org/en/news/2010/07/02/ruby-1-9-1-p429-is-released/
78
- [ 12] : http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection//
79
- [ 13] : http://www.ruby-lang.org/en/news/2009/12/07/heap-overflow-in-string/
71
+ [ 1] : http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/
72
+ [ 2] : http://www.ruby-lang.org/en/news/2013/02/22/json-dos-cve-2013-0269/
73
+ [ 3] : http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256/
74
+ [ 4] : http://www.ruby-lang.org/en/news/2012/11/09/ruby19-hashdos-cve-2012-5371/
75
+ [ 5] : http://preview.ruby-lang.org/en/news/2012/10/12/poisoned-NUL-byte-vulnerability/
76
+ [ 6] : http://www.ruby-lang.org/en/news/2012/10/12/cve-2012-4464-cve-2012-4466/
77
+ [ 7] : http://www.ruby-lang.org/en/news/2012/04/20/ruby-1-9-3-p194-is-released/
78
+ [ 8] : http://www.ruby-lang.org/en/news/2012/02/16/security-fix-for-ruby-openssl-module-allow-0n-splitting-as-a-prevention-for-the-tls-beast-attack-/
79
+ [ 9] : http://www.ruby-lang.org/en/news/2011/12/28/denial-of-service-attack-was-found-for-rubys-hash-algorithm-cve-2011-4815/
80
+ [ 10] : http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/
81
+ [ 11] : http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/
82
+ [ 12] : http://www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/
83
+ [ 13] : http://www.ruby-lang.org/en/news/2010/07/02/ruby-1-9-1-p429-is-released/
84
+ [ 14] : http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection//
85
+ [ 15] : http://www.ruby-lang.org/en/news/2009/12/07/heap-overflow-in-string/
0 commit comments