diff options
author | Divya Chellam <divya.chellam@windriver.com> | 2025-02-13 14:16:58 +0000 |
---|---|---|
committer | Steve Sakoman <steve@sakoman.com> | 2025-02-24 07:00:53 -0800 |
commit | 138ab1c7df95368efdc4b79d656f9f5b16a74b25 (patch) | |
tree | 6353d75cd6e7681d6efd8ec01281e903b34f187f /documentation/sphinx/yocto-vars.py | |
parent | 553a8e2ab3c6dd01def8499ab72cf2795fd5f382 (diff) | |
download | poky-138ab1c7df95368efdc4b79d656f9f5b16a74b25.tar.gz |
ruby: fix CVE-2024-41946
REXML is an XML toolkit for Ruby. The REXML gem 3.3.2 has a DoS
vulnerability when it parses an XML that has many entity expansions
with SAX2 or pull parser API. The REXML gem 3.3.3 or later include
the patch to fix the vulnerability.
Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-41946
Upstream-patch:
https://github.com/ruby/rexml/commit/033d1909a8f259d5a7c53681bcaf14f13bcf0368
(From OE-Core rev: b0e74fd8922bba8e954a223ec46de5c33d2ff743)
Signed-off-by: Divya Chellam <divya.chellam@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'documentation/sphinx/yocto-vars.py')
0 files changed, 0 insertions, 0 deletions