Scientific Linux Security Update : ruby on SL7.x x86_64

Medium Nessus Plugin ID 79658


The remote Scientific Linux host is missing one or more security updates.


Multiple denial of service flaws were found in the way the Ruby REXML XML parser performed expansion of parameter entities. A specially crafted XML document could cause REXML to use an excessive amount of CPU and memory. (CVE-2014-8080, CVE-2014-8090)

A stack-based buffer overflow was found in the implementation of the Ruby Array pack() method. When performing base64 encoding, a single byte could be written past the end of the buffer, possibly causing Ruby to crash. (CVE-2014-4975)

All running instances of Ruby need to be restarted for this update to take effect.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 79658

File Name: sl_20141126_ruby_on_SL7_x.nasl

Version: $Revision: 1.3 $

Type: local

Agent: unix

Published: 2014/12/02

Modified: 2015/10/05

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2014/11/26

Reference Information

CVE: CVE-2014-4975, CVE-2014-8080, CVE-2014-8090