Amazon Linux 1 Security Advisory: ALAS-2014-447
Advisory Release Date: 2014-11-13 17:25 Pacific
Advisory Updated Date: 2014-11-16 13:32 Pacific
The upstream patch for CVE-2014-8080 introduced checks against the REXML.entity_expansion_text_limit, but did not add restrictions to limit the number of expansions performed, i.e. checks against the REXML::Document.entity_expansion_limit. As a consequence, even with the patch applied, a small XML document could cause REXML to use an excessive amount of CPU time. High memory usage can be achieved using larger inputs.
Affected Packages:
ruby19
Issue Correction:
Run yum update ruby19 to update your system.
i686:
ruby19-debuginfo-1.9.3.551-32.64.amzn1.i686
rubygem19-json-1.5.5-32.64.amzn1.i686
rubygem19-bigdecimal-1.1.0-32.64.amzn1.i686
ruby19-doc-1.9.3.551-32.64.amzn1.i686
rubygem19-io-console-0.3-32.64.amzn1.i686
ruby19-libs-1.9.3.551-32.64.amzn1.i686
ruby19-1.9.3.551-32.64.amzn1.i686
ruby19-devel-1.9.3.551-32.64.amzn1.i686
noarch:
rubygems19-1.8.23.2-32.64.amzn1.noarch
rubygem19-rdoc-3.9.5-32.64.amzn1.noarch
rubygem19-minitest-2.5.1-32.64.amzn1.noarch
rubygems19-devel-1.8.23.2-32.64.amzn1.noarch
rubygem19-rake-0.9.2.2-32.64.amzn1.noarch
ruby19-irb-1.9.3.551-32.64.amzn1.noarch
src:
ruby19-1.9.3.551-32.64.amzn1.src
x86_64:
ruby19-debuginfo-1.9.3.551-32.64.amzn1.x86_64
rubygem19-json-1.5.5-32.64.amzn1.x86_64
rubygem19-io-console-0.3-32.64.amzn1.x86_64
ruby19-libs-1.9.3.551-32.64.amzn1.x86_64
ruby19-doc-1.9.3.551-32.64.amzn1.x86_64
ruby19-devel-1.9.3.551-32.64.amzn1.x86_64
rubygem19-bigdecimal-1.1.0-32.64.amzn1.x86_64
ruby19-1.9.3.551-32.64.amzn1.x86_64