USN-2397-1

Source
https://ubuntu.com/security/notices/USN-2397-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2397-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-2397-1
Upstream
Related
Published
2014-11-04T19:23:16Z
Modified
2026-02-10T04:40:50Z
Summary
ruby1.8, ruby1.9.1, ruby2.0, ruby2.1 vulnerabilities
Details

Will Wood discovered that Ruby incorrectly handled the encodes() function. An attacker could possibly use this issue to cause Ruby to crash, resulting in a denial of service, or possibly execute arbitrary code. The default compiler options for affected releases should reduce the vulnerability to a denial of service. (CVE-2014-4975)

Willis Vandevanter discovered that Ruby incorrectly handled XML entity expansion. An attacker could use this flaw to cause Ruby to consume large amounts of resources, resulting in a denial of service. (CVE-2014-8080)

References

Affected packages

Ubuntu:14.04:LTS / ruby1.9.1

Package

Name
ruby1.9.1
Purl
pkg:deb/ubuntu/ruby1.9.1@1.9.3.484-2ubuntu1.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.3.484-2ubuntu1.1

Affected versions

1.*
1.9.3.194-8.1ubuntu2
1.9.3.448-1ubuntu1
1.9.3.448-1ubuntu2
1.9.3.484-1ubuntu1
1.9.3.484-1ubuntu2
1.9.3.484-2ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.9.3.484-2ubuntu1.1",
            "binary_name": "libruby1.9.1"
        },
        {
            "binary_version": "1.9.3.484-2ubuntu1.1",
            "binary_name": "libtcltk-ruby1.9.1"
        },
        {
            "binary_version": "1.9.3.484-2ubuntu1.1",
            "binary_name": "ri1.9.1"
        },
        {
            "binary_version": "1.9.3.484-2ubuntu1.1",
            "binary_name": "ruby1.9.1"
        },
        {
            "binary_version": "1.9.3.484-2ubuntu1.1",
            "binary_name": "ruby1.9.1-dev"
        },
        {
            "binary_version": "1.9.3.484-2ubuntu1.1",
            "binary_name": "ruby1.9.1-examples"
        },
        {
            "binary_version": "1.9.3.484-2ubuntu1.1",
            "binary_name": "ruby1.9.1-full"
        },
        {
            "binary_version": "1.9.3.484-2ubuntu1.1",
            "binary_name": "ruby1.9.3"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "ecosystem": "Ubuntu:14.04:LTS",
    "cves": [
        {
            "id": "CVE-2014-4975",
            "severity": [
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2014-8080",
            "severity": [
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        }
    ]
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2397-1.json"

Ubuntu:14.04:LTS / ruby2.0

Package

Name
ruby2.0
Purl
pkg:deb/ubuntu/ruby2.0@2.0.0.484-1ubuntu2.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.0.484-1ubuntu2.1

Affected versions

2.*
2.0.0.299-2
2.0.0.343-1
2.0.0.343-1ubuntu1
2.0.0.353-1
2.0.0.353-1ubuntu1
2.0.0.484-1ubuntu1
2.0.0.484-1ubuntu2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.0.0.484-1ubuntu2.1",
            "binary_name": "libruby2.0"
        },
        {
            "binary_version": "2.0.0.484-1ubuntu2.1",
            "binary_name": "ruby2.0"
        },
        {
            "binary_version": "2.0.0.484-1ubuntu2.1",
            "binary_name": "ruby2.0-dev"
        },
        {
            "binary_version": "2.0.0.484-1ubuntu2.1",
            "binary_name": "ruby2.0-tcltk"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "ecosystem": "Ubuntu:14.04:LTS",
    "cves": [
        {
            "id": "CVE-2014-4975",
            "severity": [
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2014-8080",
            "severity": [
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        }
    ]
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2397-1.json"