Amazon Linux 1 Security Advisory: ALAS-2014-449
Advisory Release Date: 2014-11-13 17:26 Pacific
Advisory Updated Date: 2014-11-16 13:33 Pacific
The upstream patch for CVE-2014-8080 introduced checks against the REXML.entity_expansion_text_limit, but did not add restrictions to limit the number of expansions performed, i.e. checks against the REXML::Document.entity_expansion_limit. As a consequence, even with the patch applied, a small XML document could cause REXML to use an excessive amount of CPU time. High memory usage can be achieved using larger inputs.
Affected Packages:
ruby21
Issue Correction:
Run yum update ruby21 to update your system.
i686:
rubygem21-psych-2.0.5-1.15.amzn1.i686
ruby21-2.1.5-1.15.amzn1.i686
ruby21-devel-2.1.5-1.15.amzn1.i686
rubygem21-bigdecimal-1.2.4-1.15.amzn1.i686
rubygem21-io-console-0.4.2-1.15.amzn1.i686
ruby21-debuginfo-2.1.5-1.15.amzn1.i686
ruby21-libs-2.1.5-1.15.amzn1.i686
noarch:
ruby21-irb-2.1.5-1.15.amzn1.noarch
rubygems21-devel-2.2.2-1.15.amzn1.noarch
ruby21-doc-2.1.5-1.15.amzn1.noarch
rubygems21-2.2.2-1.15.amzn1.noarch
src:
ruby21-2.1.5-1.15.amzn1.src
x86_64:
rubygem21-bigdecimal-1.2.4-1.15.amzn1.x86_64
rubygem21-psych-2.0.5-1.15.amzn1.x86_64
rubygem21-io-console-0.4.2-1.15.amzn1.x86_64
ruby21-debuginfo-2.1.5-1.15.amzn1.x86_64
ruby21-2.1.5-1.15.amzn1.x86_64
ruby21-devel-2.1.5-1.15.amzn1.x86_64
ruby21-libs-2.1.5-1.15.amzn1.x86_64