Summary: | <dev-lang/ruby-{1.9.3_p551,2.0.0_p598,2.1.5}: Denial Of Service XML Expansion (CVE-2014-8090) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Hans de Graaff <graaff> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | ||
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/ | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Hans de Graaff
![]() ![]() CVE-2014-8090 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8090): The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080. All versions mentioned are in the tree. Please advise when you are ready for stabilization. Please test and mark stable: =dev-lang/ruby-1.9.3_p551 =dev-lang/ruby-2.0.0_p598 amd64 stable x86 stable Stable for HPPA. ppc stable ppc64 stable arm stable sparc stable alpha stable ia64 stable. Maintainer(s), please cleanup. Security, please vote. Cleanup done. Arches and Mainter(s), Thank you for your work. Added to an existing GLSA request. This issue was resolved and addressed in GLSA 201412-27 at http://security.gentoo.org/glsa/glsa-201412-27.xml by GLSA coordinator Sean Amoss (ackle). |