ALAS-2014-449

Related Vulnerabilities: CVE-2014-8090  

The upstream patch for CVE-2014-8080 introduced checks against the REXML.entity_expansion_text_limit, but did not add restrictions to limit the number of expansions performed, i.e. checks against the REXML::Document.entity_expansion_limit. As a consequence, even with the patch applied, a small XML document could cause REXML to use an excessive amount of CPU time. High memory usage can be achieved using larger inputs.

ALAS-2014-449


Amazon Linux AMI Security Advisory: ALAS-2014-449
Advisory Release Date: 2014-11-13 17:26 Pacific
Advisory Updated Date: 2014-11-16 13:33 Pacific
Severity: Medium
References: CVE-2014-8090 

Issue Overview:

The upstream patch for CVE-2014-8080 introduced checks against the REXML.entity_expansion_text_limit, but did not add restrictions to limit the number of expansions performed, i.e. checks against the REXML::Document.entity_expansion_limit. As a consequence, even with the patch applied, a small XML document could cause REXML to use an excessive amount of CPU time. High memory usage can be achieved using larger inputs.


Affected Packages:

ruby21


Issue Correction:
Run yum update ruby21 to update your system.

New Packages:
i686:
    rubygem21-psych-2.0.5-1.15.amzn1.i686
    ruby21-2.1.5-1.15.amzn1.i686
    ruby21-devel-2.1.5-1.15.amzn1.i686
    rubygem21-bigdecimal-1.2.4-1.15.amzn1.i686
    rubygem21-io-console-0.4.2-1.15.amzn1.i686
    ruby21-debuginfo-2.1.5-1.15.amzn1.i686
    ruby21-libs-2.1.5-1.15.amzn1.i686

noarch:
    ruby21-irb-2.1.5-1.15.amzn1.noarch
    rubygems21-devel-2.2.2-1.15.amzn1.noarch
    ruby21-doc-2.1.5-1.15.amzn1.noarch
    rubygems21-2.2.2-1.15.amzn1.noarch

src:
    ruby21-2.1.5-1.15.amzn1.src

x86_64:
    rubygem21-bigdecimal-1.2.4-1.15.amzn1.x86_64
    rubygem21-psych-2.0.5-1.15.amzn1.x86_64
    rubygem21-io-console-0.4.2-1.15.amzn1.x86_64
    ruby21-debuginfo-2.1.5-1.15.amzn1.x86_64
    ruby21-2.1.5-1.15.amzn1.x86_64
    ruby21-devel-2.1.5-1.15.amzn1.x86_64
    ruby21-libs-2.1.5-1.15.amzn1.x86_64