MGASA-2025-0001

Source
https://advisories.mageia.org/MGASA-2025-0001.html
Import Source
https://advisories.mageia.org/MGASA-2025-0001.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2025-0001
Related
Published
2025-01-04T21:09:30Z
Modified
2025-01-04T20:35:27Z
Summary
Updated ruby packages fix security vulnerabilities
Details

The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many <s in an attribute value. (CVE-2024-35176) The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as <, 0 and %>. (CVE-2024-39908) The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, >] and ]>. (CVE-2024-41123) The REXML gem 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API. (CVE-2024-41946) The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. (CVE-2024-43398) The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between &# and x...; in a hex numeric character reference (&#x...;). (CVE-2024-49761)

References
Credits

Affected packages

Mageia:9 / ruby

Package

Name
ruby
Purl
pkg:rpm/mageia/ruby?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.5-46.mga9

Ecosystem specific

{
    "section": "core"
}