[arch-security] [Arch Linux Security Advisory ASA-201411-16] ruby: denial of service
Levente Polyak
anthraxx at archlinux.org
Mon Nov 17 16:47:56 UTC 2014
Arch Linux Security Advisory ASA-201411-16
==========================================
Severity: Medium
Date : 2014-11-17
CVE-ID : CVE-2014-8090
Package : ruby
Type : denial of service
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE-2014
Summary
=======
The package ruby before version 2.1.5-1 is vulnerable to denial service
through unrestricted XML entity expansion.
Resolution
==========
Upgrade to 2.1.5-1.
# pacman -Syu "ruby>=2.1.5-1"
The problem has been fixed upstream in version 2.1.5.
Workaround
==========
If you cannot upgrade Ruby, use this monkey patch as a workaround:
class REXML::Document
def document
self
end
end
Description
===========
CPU exhaustion can occur as a result of recursive expansion with an
empty string. When reading text nodes from an XML document, the REXML
parser can be coerced into allocating extremely large string objects
which can consume all of the memory on a machine, causing a denial of
service.
Impact
======
A remote attacker using an specially crafted XML document is able to
perform denial of service through CPU and/or memory exhaustion.
References
==========
https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/
https://access.redhat.com/security/cve/CVE-2014-8090
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20141117/a0f8c86e/attachment.bin>
More information about the arch-security
mailing list