vulnerability

Oracle Linux: CVE-2024-41123: ELSA-2024-6670: pcs security update (MODERATE) (Multiple Advisories)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
2024-08-01
Added
2024-10-16
Modified
2025-05-07

Description

REXML is an XML toolkit for Ruby. The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `>]` and `]>`. The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities.
A vulnerability was found in REXML, an XML toolkit used for Ruby. When parsing an untrusted XML with many specific characters, the REXML gem may take a long time, leading to a denial of service condition. Some of these special characters include the whitespace character, '>]', and ']>'.

Solution(s)

oracle-linux-upgrade-pcsoracle-linux-upgrade-pcs-snmporacle-linux-upgrade-rubyoracle-linux-upgrade-ruby-bundled-gemsoracle-linux-upgrade-ruby-default-gemsoracle-linux-upgrade-ruby-develoracle-linux-upgrade-ruby-docoracle-linux-upgrade-rubygem-abrtoracle-linux-upgrade-rubygem-abrt-docoracle-linux-upgrade-rubygem-bigdecimaloracle-linux-upgrade-rubygem-bundleroracle-linux-upgrade-rubygem-io-consoleoracle-linux-upgrade-rubygem-irboracle-linux-upgrade-rubygem-jsonoracle-linux-upgrade-rubygem-minitestoracle-linux-upgrade-rubygem-mysql2oracle-linux-upgrade-rubygem-mysql2-docoracle-linux-upgrade-rubygem-pgoracle-linux-upgrade-rubygem-pg-docoracle-linux-upgrade-rubygem-power-assertoracle-linux-upgrade-rubygem-psychoracle-linux-upgrade-rubygem-raccoracle-linux-upgrade-rubygem-rakeoracle-linux-upgrade-rubygem-rbsoracle-linux-upgrade-rubygem-rdocoracle-linux-upgrade-rubygem-rexmloracle-linux-upgrade-rubygem-rssoracle-linux-upgrade-rubygemsoracle-linux-upgrade-rubygems-develoracle-linux-upgrade-rubygem-test-unitoracle-linux-upgrade-rubygem-typeproforacle-linux-upgrade-ruby-libs
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.