[ALAS-2014-441] Amazon Linux AMI 2014.03 - ALAS-2014-441: medium priority package update for ruby20
Severity
Medium
Affected Packages
18
CVEs
1
Package updates are available for Amazon Linux AMI that fix the following vulnerabilities:
CVE-2014-8080:
The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
1157709:
CVE-2014-8080 ruby: REXML billion laughs attack via parameter entity expansion
- ID
- ALAS-2014-441
- Severity
- medium
- URL
- https://alas.aws.amazon.com/ALAS-2014-441.html
- Published
-
2014-11-05T12:16:00
(10 years ago) - Modified
-
2014-11-05T14:40:00
(10 years ago) - Rights
- Amazon Linux Security Team
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2014-8080 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8080 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/amazonlinux/rubygems20?arch=noarch&distro=amazonlinux-1 | amazonlinux | rubygems20 | < 2.0.14-1.19.amzn1 | amazonlinux-1 | noarch | |
Affected | pkg:rpm/amazonlinux/rubygems20-devel?arch=noarch&distro=amazonlinux-1 | amazonlinux | rubygems20-devel | < 2.0.14-1.19.amzn1 | amazonlinux-1 | noarch | |
Affected | pkg:rpm/amazonlinux/rubygem20-psych?arch=x86_64&distro=amazonlinux-1 | amazonlinux | rubygem20-psych | < 2.0.0-1.19.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/rubygem20-psych?arch=i686&distro=amazonlinux-1 | amazonlinux | rubygem20-psych | < 2.0.0-1.19.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/rubygem20-io-console?arch=x86_64&distro=amazonlinux-1 | amazonlinux | rubygem20-io-console | < 0.4.2-1.19.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/rubygem20-io-console?arch=i686&distro=amazonlinux-1 | amazonlinux | rubygem20-io-console | < 0.4.2-1.19.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/rubygem20-bigdecimal?arch=x86_64&distro=amazonlinux-1 | amazonlinux | rubygem20-bigdecimal | < 1.2.0-1.19.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/rubygem20-bigdecimal?arch=i686&distro=amazonlinux-1 | amazonlinux | rubygem20-bigdecimal | < 1.2.0-1.19.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/ruby20?arch=x86_64&distro=amazonlinux-1 | amazonlinux | ruby20 | < 2.0.0.594-1.19.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/ruby20?arch=i686&distro=amazonlinux-1 | amazonlinux | ruby20 | < 2.0.0.594-1.19.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/ruby20-libs?arch=x86_64&distro=amazonlinux-1 | amazonlinux | ruby20-libs | < 2.0.0.594-1.19.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/ruby20-libs?arch=i686&distro=amazonlinux-1 | amazonlinux | ruby20-libs | < 2.0.0.594-1.19.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/ruby20-irb?arch=noarch&distro=amazonlinux-1 | amazonlinux | ruby20-irb | < 2.0.0.594-1.19.amzn1 | amazonlinux-1 | noarch | |
Affected | pkg:rpm/amazonlinux/ruby20-doc?arch=noarch&distro=amazonlinux-1 | amazonlinux | ruby20-doc | < 2.0.0.594-1.19.amzn1 | amazonlinux-1 | noarch | |
Affected | pkg:rpm/amazonlinux/ruby20-devel?arch=x86_64&distro=amazonlinux-1 | amazonlinux | ruby20-devel | < 2.0.0.594-1.19.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/ruby20-devel?arch=i686&distro=amazonlinux-1 | amazonlinux | ruby20-devel | < 2.0.0.594-1.19.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/ruby20-debuginfo?arch=x86_64&distro=amazonlinux-1 | amazonlinux | ruby20-debuginfo | < 2.0.0.594-1.19.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/ruby20-debuginfo?arch=i686&distro=amazonlinux-1 | amazonlinux | ruby20-debuginfo | < 2.0.0.594-1.19.amzn1 | amazonlinux-1 | i686 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |