aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorStanislav Sedov <stas@FreeBSD.org>2008-06-21 11:24:53 +0000
committerStanislav Sedov <stas@FreeBSD.org>2008-06-21 11:24:53 +0000
commit9b9c2f302bb31beec7c4d01603d6b7964eee49de (patch)
tree77ef98a980bc286069c9bd519ce6f86da880a8de /security/vuxml/vuln.xml
parent169c5bde316eda27f1a275fe3eec510516bc30ed (diff)
downloadports-9b9c2f302bb31beec7c4d01603d6b7964eee49de.tar.gz
ports-9b9c2f302bb31beec7c4d01603d6b7964eee49de.zip
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml34
1 files changed, 34 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 5ec2b93d606e..7e0f9ea4e4c6 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,40 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="53802164-3f7e-11dd-90ea-0019666436c2">
+ <topic>ruby -- multiple integer and buffer overflow vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>ruby</name>
+ <name>ruby+pthreads</name>
+ <name>ruby+pthreads+oniguruma</name>
+ <name>ruby+oniguruma</name>
+ <range><ge>1.8.*,1</ge><lt>1.8.6.111_3,1</lt></range>
+ </package>
+ <package>
+ <name>ruby_static</name>
+ <range><ge>1.8.*,1</ge></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The official ruby site reports:</p>
+ <blockquote cite="http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/">
+ <p>Multiple vulnerabilities in Ruby may lead to a denial of service
+ (DoS) condition or allow execution of arbitrary code.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2008-2726</cvename>
+ <url>http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/</url>
+ </references>
+ <dates>
+ <discovery>2008-06-19</discovery>
+ <entry>2008-06-21</entry>
+ </dates>
+ </vuln>
+
<vuln vid="168190df-3e9a-11dd-87bc-000ea69a5213">
<topic>fetchmail -- potential crash in -v -v verbose mode</topic>
<affects>