vulnerability
Arch Linux: Incorrect calculation (CVE-2021-28965)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Apr 21, 2021 | Jul 11, 2025 | Nov 27, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Apr 21, 2021
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
When parsing and serializing a crafted XML document, the REXML gem (including the one bundled with Ruby) can create a wrong XML document whose structure is different from the original one. The impact of this issue highly depends on context, but it may lead to a vulnerability in some programs that are using REXML. The issue is fixed in version 3.2.5 of the REXML gem.
Solution
arch-linux-upgrade-latest
References
- CVE-2021-28965
- https://attackerkb.com/topics/CVE-2021-28965
- URL-https://about.gitlab.com/releases/2021/04/14/security-release-gitlab-13-10-3-released/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTVFTLFVCSUE5CXHINJEUCKSHU4SWDMT/
- URL-https://security.archlinux.org/ASA-202104-1
- URL-https://security.netapp.com/advisory/ntap-20210528-0003/
- URL-https://www.ruby-lang.org/en/news/2021/04/05/xml-round-trip-vulnerability-in-rexml-cve-2021-28965/
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.