Skip to content

Upgrade REXML gem to 3.3.6 to fix DoS vulnerability (CVE-2024-43398) #468

@yuzhongqi

Description

@yuzhongqi

Description

Summary
The REXML gem versions prior to 3.3.6 contain a Denial of Service (DoS) vulnerability when parsing deeply nested XML documents that have elements with the same local name attributes.

Impact
Applications using REXML::Document.new (tree parser API) to parse untrusted XML input may consume excessive memory and CPU, potentially leading to application hangs or crashes.
Projects that only use the stream or SAX2 parser APIs are not affected.

Affected Component
/output/SourcePackages/checkouts/DeviceKit/Gemfile.lock
Detected version: rexml 3.2.5

Fix / Recommendation
Upgrade the rexml gem to version 3.3.6 or later to include the official patch.

Workaround
If immediate upgrade is not possible, avoid parsing untrusted XML data using the tree parser API (REXML::Document.new).

References
Ruby security advisory: https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398/

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions