Bug 1224390 (CVE-2024-35176)

Summary: VUL-0: CVE-2024-35176: ruby3.2, rubygem-rexml: denial of service when parsing an XML that has many left angled brackets in an attribute value
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Marcus Rückert <mrueckert>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: camila.matos
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/406069/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-35176:5.3:(AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-05-16 19:04:46 UTC
REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an attribute value. Those who need to parse untrusted XMLs may be impacted to this vulnerability. The REXML gem 3.2.7 or later include the patch to fix this vulnerability. As a workaround, don't parse untrusted XMLs.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-35176
https://www.cve.org/CVERecord?id=CVE-2024-35176
https://github.com/ruby/rexml/commit/4325835f92f3f142ebd91a3fdba4e1f1ab7f1cfb
https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh
https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176