Show plain JSON{"affected_release": [{"advisory": "RHSA-2024:6784", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "ruby:3.3-8100020240906074654.489197e6", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2024-09-18T00:00:00Z"}, {"advisory": "RHSA-2025:4063", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "ruby:3.1-8100020250407112943.489197e6", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2025-04-23T00:00:00Z"}, {"advisory": "RHSA-2024:6670", "cpe": "cpe:/a:redhat:enterprise_linux:8::highavailability", "package": "pcs-0:0.10.18-2.el8_10.2", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2024-09-16T00:00:00Z"}, {"advisory": "RHSA-2024:6702", "cpe": "cpe:/a:redhat:rhel_tus:8.6::highavailability", "package": "pcs-0:0.10.12-6.el8_6.6", "product_name": "Red Hat Enterprise Linux 8.6 Telecommunications Update Service", "release_date": "2024-09-16T00:00:00Z"}, {"advisory": "RHSA-2024:6702", "cpe": "cpe:/a:redhat:rhel_e4s:8.6::highavailability", "package": "pcs-0:0.10.12-6.el8_6.6", "product_name": "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions", "release_date": "2024-09-16T00:00:00Z"}, {"advisory": "RHSA-2024:6703", "cpe": "cpe:/a:redhat:rhel_eus:8.8::highavailability", "package": "pcs-0:0.10.15-4.el8_8.3", "product_name": "Red Hat Enterprise Linux 8.8 Extended Update Support", "release_date": "2024-09-16T00:00:00Z"}, {"advisory": "RHSA-2024:6785", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "ruby:3.3-9040020240906110954.9", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2024-09-18T00:00:00Z"}], "bugzilla": {"description": "rexml: DoS vulnerability in REXML", "id": "2302272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302272"}, "csaw": false, "cvss3": {"cvss3_base_score": "3.3", "cvss3_scoring_vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "status": "verified"}, "cwe": "CWE-400", "details": ["REXML is an XML toolkit for Ruby. The REXML gem 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API. The REXML gem 3.3.3 or later include the patch to fix the vulnerability.", "A flaw was found in the REXML package. Reading an XML file that contains many entity expansions may lead to a denial of service due to resource starvation. An attacker can use this flaw to trick a user into processing an untrusted XML file."], "mitigation": {"lang": "en:us", "value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."}, "name": "CVE-2024-41946", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:8", "fix_state": "Fix deferred", "package_name": "ruby:2.5/ruby", "product_name": "Red Hat Enterprise Linux 8"}, {"cpe": "cpe:/o:redhat:enterprise_linux:9", "fix_state": "Affected", "package_name": "pcs", "product_name": "Red Hat Enterprise Linux 9"}, {"cpe": "cpe:/o:redhat:enterprise_linux:9", "fix_state": "Affected", "package_name": "ruby:3.0/ruby", "product_name": "Red Hat Enterprise Linux 9"}, {"cpe": "cpe:/o:redhat:enterprise_linux:9", "fix_state": "Fix deferred", "package_name": "ruby:3.1/ruby", "product_name": "Red Hat Enterprise Linux 9"}, {"cpe": "cpe:/a:redhat:openstack:16.1", "fix_state": "Fix deferred", "package_name": "puppet-datacat", "product_name": "Red Hat OpenStack Platform 16.1"}, {"cpe": "cpe:/a:redhat:openstack:16.1", "fix_state": "Fix deferred", "package_name": "puppet-etcd", "product_name": "Red Hat OpenStack Platform 16.1"}, {"cpe": "cpe:/a:redhat:openstack:16.1", "fix_state": "Out of support scope", "package_name": "puppet-opendaylight", "product_name": "Red Hat OpenStack Platform 16.1"}, {"cpe": "cpe:/a:redhat:openstack:16.2", "fix_state": "Not affected", "package_name": "puppet-datacat", "product_name": "Red Hat OpenStack Platform 16.2"}, {"cpe": "cpe:/a:redhat:openstack:16.2", "fix_state": "Not affected", "package_name": "puppet-etcd", "product_name": "Red Hat OpenStack Platform 16.2"}, {"cpe": "cpe:/a:redhat:openstack:16.2", "fix_state": "Not affected", "package_name": "puppet-opendaylight", "product_name": "Red Hat OpenStack Platform 16.2"}, {"cpe": "cpe:/a:redhat:openstack:17.1", "fix_state": "Not affected", "package_name": "puppet-etcd", "product_name": "Red Hat OpenStack Platform 17.1"}, {"cpe": "cpe:/a:redhat:satellite:6", "fix_state": "Fix deferred", "package_name": "foreman", "product_name": "Red Hat Satellite 6"}, {"cpe": "cpe:/a:redhat:satellite:6", "fix_state": "Fix deferred", "package_name": "foreman-proxy", "product_name": "Red Hat Satellite 6"}], "public_date": "2024-08-01T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2024-41946\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41946\nhttps://github.com/ruby/rexml/commit/033d1909a8f259d5a7c53681bcaf14f13bcf0368\nhttps://github.com/ruby/rexml/security/advisories/GHSA-5866-49gr-22v4\nhttps://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml\nhttps://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41946"], "threat_severity": "Low"}