Lucene search

K
amazonAmazonALAS-2021-1501
HistoryMay 14, 2021 - 4:58 p.m.

Medium: ruby24

2021-05-1416:58:00
alas.aws.amazon.com
17
rexml gem
ruby
xml round-trip
parsing
serializing
cve-2021-28965

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

7.9

Confidence

High

EPSS

0.001

Percentile

43.0%

Issue Overview:

The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing. (CVE-2021-28965)

Affected Packages:

ruby24

Issue Correction:
Run yum update ruby24 to update your system.

New Packages:

i686:  
    rubygem24-json-2.0.4-2.14.amzn1.i686  
    ruby24-2.4.10-2.14.amzn1.i686  
    rubygem24-bigdecimal-1.3.2-2.14.amzn1.i686  
    ruby24-devel-2.4.10-2.14.amzn1.i686  
    ruby24-debuginfo-2.4.10-2.14.amzn1.i686  
    rubygem24-xmlrpc-0.2.1-2.14.amzn1.i686  
    rubygem24-psych-2.2.2-2.14.amzn1.i686  
    rubygem24-io-console-0.4.6-2.14.amzn1.i686  
    ruby24-libs-2.4.10-2.14.amzn1.i686  
    rubygem24-net-telnet-0.1.1-2.14.amzn1.i686  
  
noarch:  
    rubygems24-devel-2.6.14.4-2.14.amzn1.noarch  
    ruby24-doc-2.4.10-2.14.amzn1.noarch  
    rubygem24-did_you_mean-1.1.0-2.14.amzn1.noarch  
    rubygems24-2.6.14.4-2.14.amzn1.noarch  
    rubygem24-power_assert-0.4.1-2.14.amzn1.noarch  
    ruby24-irb-2.4.10-2.14.amzn1.noarch  
    rubygem24-test-unit-3.2.3-2.14.amzn1.noarch  
    rubygem24-minitest5-5.10.1-2.14.amzn1.noarch  
    rubygem24-rdoc-5.0.1-2.14.amzn1.noarch  
  
src:  
    ruby24-2.4.10-2.14.amzn1.src  
  
x86_64:  
    rubygem24-io-console-0.4.6-2.14.amzn1.x86_64  
    rubygem24-psych-2.2.2-2.14.amzn1.x86_64  
    ruby24-devel-2.4.10-2.14.amzn1.x86_64  
    ruby24-2.4.10-2.14.amzn1.x86_64  
    rubygem24-bigdecimal-1.3.2-2.14.amzn1.x86_64  
    ruby24-debuginfo-2.4.10-2.14.amzn1.x86_64  
    rubygem24-json-2.0.4-2.14.amzn1.x86_64  
    ruby24-libs-2.4.10-2.14.amzn1.x86_64  
    rubygem24-xmlrpc-0.2.1-2.14.amzn1.x86_64  
    rubygem24-net-telnet-0.1.1-2.14.amzn1.x86_64  

Additional References

Red Hat: CVE-2021-28965

Mitre: CVE-2021-28965

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

7.9

Confidence

High

EPSS

0.001

Percentile

43.0%