First published: Mon Oct 28 2024(Updated: )
### Impact The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between `&#` and `x...;` in a hex numeric character reference (`&#x...;`). This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. Note that Ruby 3.1 will reach EOL on 2025-03. ### Patches The REXML gem 3.3.9 or later include the patch to fix the vulnerability. ### Workarounds Use Ruby 3.2 or later instead of Ruby 3.1. ### References * https://www.ruby-lang.org/en/news/2024/10/28/redos-rexml-cve-2024-49761/: An announce on www.ruby-lang.org
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/rexml | <3.3.9 | 3.3.9 |
debian/ruby2.7 | 2.7.4-1+deb11u1 2.7.4-1+deb11u2 | |
debian/ruby3.1 | <=3.1.2-7+deb12u1<=3.1.2-8.4 | |
debian/ruby3.2 | <=3.2.3-1 | |
debian/ruby3.3 | <=3.3.5-2 | |
Ruby-lang Rexml | <3.3.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.