[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2014-448 ---- ruby20 rubygems20 rubygem20

ID: oval:org.secpod.oval:def:1600113Date: (C)2016-01-19   (M)2024-02-19
Class: PATCHFamily: unix




The upstream patch for CVE-2014-8080 introduced checks against the REXML.entity_expansion_text_limit, but did not add restrictions to limit the number of expansions performed, i.e. checks against the REXML::Document.entity_expansion_limit. As a consequence, even with the patch applied, a small XML document could cause REXML to use an excessive amount of CPU time. High memory usage can be achieved using larger inputs.

Platform:
Amazon Linux AMI
Product:
ruby20
rubygems20
rubygem20
Reference:
ALAS-2014-448
CVE-2014-8090
CVE    1
CVE-2014-8090
CPE    4
cpe:/o:amazon:linux
cpe:/a:ruby:rubygems20
cpe:/a:ruby:ruby20
cpe:/a:ruby:rubygem20
...

© SecPod Technologies