vulnerability
Rocky Linux: CVE-2024-41123: ruby-3.1 (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Aug 1, 2024 | Sep 17, 2024 | Oct 6, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Aug 1, 2024
Added
Sep 17, 2024
Modified
Oct 6, 2025
Description
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `>]` and `]>`. The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities.
Solutions
rocky-upgrade-pcsrocky-upgrade-pcs-snmprocky-upgrade-rubyrocky-upgrade-ruby-bundled-gemsrocky-upgrade-ruby-bundled-gems-debuginforocky-upgrade-ruby-debuginforocky-upgrade-ruby-debugsourcerocky-upgrade-ruby-develrocky-upgrade-ruby-libsrocky-upgrade-ruby-libs-debuginforocky-upgrade-rubygem-bigdecimalrocky-upgrade-rubygem-bigdecimal-debuginforocky-upgrade-rubygem-io-consolerocky-upgrade-rubygem-io-console-debuginforocky-upgrade-rubygem-jsonrocky-upgrade-rubygem-json-debuginforocky-upgrade-rubygem-mysql2rocky-upgrade-rubygem-mysql2-debuginforocky-upgrade-rubygem-mysql2-debugsourcerocky-upgrade-rubygem-pgrocky-upgrade-rubygem-pg-debuginforocky-upgrade-rubygem-pg-debugsourcerocky-upgrade-rubygem-psychrocky-upgrade-rubygem-psych-debuginforocky-upgrade-rubygem-raccrocky-upgrade-rubygem-racc-debuginforocky-upgrade-rubygem-rbsrocky-upgrade-rubygem-rbs-debuginfo
References
- CVE-2024-41123
- https://attackerkb.com/topics/CVE-2024-41123
- CWE-400
- URL-https://errata.rockylinux.org/RLSA-2024:6670
- URL-https://errata.rockylinux.org/RLSA-2024:6784
- URL-https://errata.rockylinux.org/RLSA-2024:6785
- URL-https://errata.rockylinux.org/RLSA-2025:4063
- URL-https://errata.rockylinux.org/RLSA-2025:4488
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.