CVE-2014-8090
Publication date 14 November 2014
Last updated 24 July 2024
Ubuntu priority
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
Status
Package | Ubuntu Release | Status |
---|---|---|
ruby1.8 | ||
14.04 LTS trusty | Not in release | |
ruby1.9.1 | ||
14.04 LTS trusty |
Fixed 1.9.3.484-2ubuntu1.2
|
|
ruby2.0 | ||
14.04 LTS trusty |
Fixed 2.0.0.484-1ubuntu2.2
|
|
ruby2.1 | ||
14.04 LTS trusty | Not in release | |
Patch details
Package | Patch details |
---|---|
ruby1.9.1 | |
ruby2.0 | |
ruby2.1 |
References
Related Ubuntu Security Notices (USN)
- USN-2412-1
- Ruby vulnerability
- 20 November 2014