[ALAS-2014-439] Amazon Linux AMI 2014.03 - ALAS-2014-439: medium priority package update for ruby21
Severity
Medium
Affected Packages
18
CVEs
1
Package updates are available for Amazon Linux AMI that fix the following vulnerabilities:
CVE-2014-8080:
The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
1157709:
CVE-2014-8080 ruby: REXML billion laughs attack via parameter entity expansion
- ID
- ALAS-2014-439
- Severity
- medium
- URL
- https://alas.aws.amazon.com/ALAS-2014-439.html
- Published
-
2014-11-05T12:13:00
(10 years ago) - Modified
-
2014-11-05T14:38:00
(10 years ago) - Rights
- Amazon Linux Security Team
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2014-8080 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8080 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/amazonlinux/rubygems21?arch=noarch&distro=amazonlinux-1 | amazonlinux | rubygems21 | < 2.2.2-1.14.amzn1 | amazonlinux-1 | noarch | |
Affected | pkg:rpm/amazonlinux/rubygems21-devel?arch=noarch&distro=amazonlinux-1 | amazonlinux | rubygems21-devel | < 2.2.2-1.14.amzn1 | amazonlinux-1 | noarch | |
Affected | pkg:rpm/amazonlinux/rubygem21-psych?arch=x86_64&distro=amazonlinux-1 | amazonlinux | rubygem21-psych | < 2.0.5-1.14.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/rubygem21-psych?arch=i686&distro=amazonlinux-1 | amazonlinux | rubygem21-psych | < 2.0.5-1.14.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/rubygem21-io-console?arch=x86_64&distro=amazonlinux-1 | amazonlinux | rubygem21-io-console | < 0.4.2-1.14.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/rubygem21-io-console?arch=i686&distro=amazonlinux-1 | amazonlinux | rubygem21-io-console | < 0.4.2-1.14.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/rubygem21-bigdecimal?arch=x86_64&distro=amazonlinux-1 | amazonlinux | rubygem21-bigdecimal | < 1.2.4-1.14.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/rubygem21-bigdecimal?arch=i686&distro=amazonlinux-1 | amazonlinux | rubygem21-bigdecimal | < 1.2.4-1.14.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/ruby21?arch=x86_64&distro=amazonlinux-1 | amazonlinux | ruby21 | < 2.1.4-1.14.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/ruby21?arch=i686&distro=amazonlinux-1 | amazonlinux | ruby21 | < 2.1.4-1.14.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/ruby21-libs?arch=x86_64&distro=amazonlinux-1 | amazonlinux | ruby21-libs | < 2.1.4-1.14.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/ruby21-libs?arch=i686&distro=amazonlinux-1 | amazonlinux | ruby21-libs | < 2.1.4-1.14.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/ruby21-irb?arch=noarch&distro=amazonlinux-1 | amazonlinux | ruby21-irb | < 2.1.4-1.14.amzn1 | amazonlinux-1 | noarch | |
Affected | pkg:rpm/amazonlinux/ruby21-doc?arch=noarch&distro=amazonlinux-1 | amazonlinux | ruby21-doc | < 2.1.4-1.14.amzn1 | amazonlinux-1 | noarch | |
Affected | pkg:rpm/amazonlinux/ruby21-devel?arch=x86_64&distro=amazonlinux-1 | amazonlinux | ruby21-devel | < 2.1.4-1.14.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/ruby21-devel?arch=i686&distro=amazonlinux-1 | amazonlinux | ruby21-devel | < 2.1.4-1.14.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/ruby21-debuginfo?arch=x86_64&distro=amazonlinux-1 | amazonlinux | ruby21-debuginfo | < 2.1.4-1.14.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/ruby21-debuginfo?arch=i686&distro=amazonlinux-1 | amazonlinux | ruby21-debuginfo | < 2.1.4-1.14.amzn1 | amazonlinux-1 | i686 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |