<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for rubygem-rexml</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:0129-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-04-17T04:01:39Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-04-17T04:01:39Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-04-17T04:01:39Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for rubygem-rexml</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
rubygem-rexml was updated to 3.3.9:

- fixes CVE-2024-49761, CVE-2024-43398, CVE-2024-41946,
  CVE-2024-41123, CVE-2024-39908, CVE-2024-35176
- bsc#1232440, bsc#1229673, bsc#1228799, bsc#1228794,
  bsc#1228072, bsc#1224390</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2025-129</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DGKHOJBF7CZTZV4MBBSARWRERGVICQZ5/</URL>
      <Description>E-Mail link for openSUSE-SU-2025:0129-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224390</URL>
      <Description>SUSE Bug 1224390</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228072</URL>
      <Description>SUSE Bug 1228072</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228794</URL>
      <Description>SUSE Bug 1228794</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228799</URL>
      <Description>SUSE Bug 1228799</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229673</URL>
      <Description>SUSE Bug 1229673</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232440</URL>
      <Description>SUSE Bug 1232440</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35176/</URL>
      <Description>SUSE CVE CVE-2024-35176 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-39908/</URL>
      <Description>SUSE CVE CVE-2024-39908 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41123/</URL>
      <Description>SUSE CVE CVE-2024-41123 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41946/</URL>
      <Description>SUSE CVE CVE-2024-41946 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-43398/</URL>
      <Description>SUSE CVE CVE-2024-43398 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49761/</URL>
      <Description>SUSE CVE CVE-2024-49761 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP6">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP6">
        <FullProductName ProductID="SUSE Package Hub 15 SP6">SUSE Package Hub 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.5-rubygem-rexml-3.3.9-bp156.4.3.1">
      <FullProductName ProductID="ruby2.5-rubygem-rexml-3.3.9-bp156.4.3.1">ruby2.5-rubygem-rexml-3.3.9-bp156.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.5-rubygem-rexml-doc-3.3.9-bp156.4.3.1">
      <FullProductName ProductID="ruby2.5-rubygem-rexml-doc-3.3.9-bp156.4.3.1">ruby2.5-rubygem-rexml-doc-3.3.9-bp156.4.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ruby2.5-rubygem-rexml-3.3.9-bp156.4.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP6">
      <FullProductName ProductID="SUSE Package Hub 15 SP6:ruby2.5-rubygem-rexml-3.3.9-bp156.4.3.1">ruby2.5-rubygem-rexml-3.3.9-bp156.4.3.1 as a component of SUSE Package Hub 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.5-rubygem-rexml-doc-3.3.9-bp156.4.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP6">
      <FullProductName ProductID="SUSE Package Hub 15 SP6:ruby2.5-rubygem-rexml-doc-3.3.9-bp156.4.3.1">ruby2.5-rubygem-rexml-doc-3.3.9-bp156.4.3.1 as a component of SUSE Package Hub 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.5-rubygem-rexml-3.3.9-bp156.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:ruby2.5-rubygem-rexml-3.3.9-bp156.4.3.1">ruby2.5-rubygem-rexml-3.3.9-bp156.4.3.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.5-rubygem-rexml-doc-3.3.9-bp156.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:ruby2.5-rubygem-rexml-doc-3.3.9-bp156.4.3.1">ruby2.5-rubygem-rexml-doc-3.3.9-bp156.4.3.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en"> REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `&lt;`s in an attribute value. Those who need to parse untrusted XMLs may be impacted to this vulnerability. The REXML gem 3.2.7 or later include the patch to fix this vulnerability. As a workaround, don't parse untrusted XMLs.</Note>
    </Notes>
    <CVE>CVE-2024-35176</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP6:ruby2.5-rubygem-rexml-3.3.9-bp156.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:ruby2.5-rubygem-rexml-doc-3.3.9-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ruby2.5-rubygem-rexml-3.3.9-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ruby2.5-rubygem-rexml-doc-3.3.9-bp156.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DGKHOJBF7CZTZV4MBBSARWRERGVICQZ5/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35176.html</URL>
        <Description>CVE-2024-35176</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224390</URL>
        <Description>SUSE Bug 1224390</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en"> REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `&lt;`, `0` and `%&gt;`. If you need to parse untrusted XMLs, you many be impacted to these vulnerabilities. The REXML gem 3.3.2 or later include the patches to fix these vulnerabilities. Users are advised to upgrade. Users unable to upgrade should avoid parsing untrusted XML strings.</Note>
    </Notes>
    <CVE>CVE-2024-39908</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP6:ruby2.5-rubygem-rexml-3.3.9-bp156.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:ruby2.5-rubygem-rexml-doc-3.3.9-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ruby2.5-rubygem-rexml-3.3.9-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ruby2.5-rubygem-rexml-doc-3.3.9-bp156.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DGKHOJBF7CZTZV4MBBSARWRERGVICQZ5/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-39908.html</URL>
        <Description>CVE-2024-39908</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228072</URL>
        <Description>SUSE Bug 1228072</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">REXML is an XML toolkit for Ruby. The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `&gt;]` and `]&gt;`. The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities.</Note>
    </Notes>
    <CVE>CVE-2024-41123</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP6:ruby2.5-rubygem-rexml-3.3.9-bp156.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:ruby2.5-rubygem-rexml-doc-3.3.9-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ruby2.5-rubygem-rexml-3.3.9-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ruby2.5-rubygem-rexml-doc-3.3.9-bp156.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DGKHOJBF7CZTZV4MBBSARWRERGVICQZ5/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41123.html</URL>
        <Description>CVE-2024-41123</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228794</URL>
        <Description>SUSE Bug 1228794</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">REXML is an XML toolkit for Ruby. The REXML gem 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API. The REXML gem 3.3.3 or later include the patch to fix the vulnerability.</Note>
    </Notes>
    <CVE>CVE-2024-41946</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP6:ruby2.5-rubygem-rexml-3.3.9-bp156.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:ruby2.5-rubygem-rexml-doc-3.3.9-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ruby2.5-rubygem-rexml-3.3.9-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ruby2.5-rubygem-rexml-doc-3.3.9-bp156.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DGKHOJBF7CZTZV4MBBSARWRERGVICQZ5/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41946.html</URL>
        <Description>CVE-2024-41946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228799</URL>
        <Description>SUSE Bug 1228799</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">REXML is an XML toolkit for Ruby. The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like REXML::Document.new, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected. The REXML gem 3.3.6 or later include the patch to fix the vulnerability.</Note>
    </Notes>
    <CVE>CVE-2024-43398</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP6:ruby2.5-rubygem-rexml-3.3.9-bp156.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:ruby2.5-rubygem-rexml-doc-3.3.9-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ruby2.5-rubygem-rexml-3.3.9-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ruby2.5-rubygem-rexml-doc-3.3.9-bp156.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DGKHOJBF7CZTZV4MBBSARWRERGVICQZ5/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-43398.html</URL>
        <Description>CVE-2024-43398</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229673</URL>
        <Description>SUSE Bug 1229673</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">REXML is an XML toolkit for Ruby. The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between &amp;# and x...; in a hex numeric character reference (&amp;#x...;). This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. The REXML gem 3.3.9 or later include the patch to fix the vulnerability.</Note>
    </Notes>
    <CVE>CVE-2024-49761</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP6:ruby2.5-rubygem-rexml-3.3.9-bp156.4.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP6:ruby2.5-rubygem-rexml-doc-3.3.9-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ruby2.5-rubygem-rexml-3.3.9-bp156.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ruby2.5-rubygem-rexml-doc-3.3.9-bp156.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DGKHOJBF7CZTZV4MBBSARWRERGVICQZ5/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49761.html</URL>
        <Description>CVE-2024-49761</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232440</URL>
        <Description>SUSE Bug 1232440</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
