Skip to content

Commit 5bbc3e3

Browse files
committed
Tranlates 2024-08-01 dos rexml (ko)
1 parent 2dcdee7 commit 5bbc3e3

File tree

2 files changed

+26
-26
lines changed

2 files changed

+26
-26
lines changed
Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,29 @@
11
---
22
layout: news_post
3-
title: "CVE-2024-41123: DoS vulnerabilities in REXML"
3+
title: "CVE-2024-41123: REXML의 DoS 취약점"
44
author: "kou"
5-
translator:
5+
translator: "shia"
66
date: 2024-08-01 03:00:00 +0000
77
tags: security
8-
lang: en
8+
lang: ko
99
---
1010

11-
There are some DoS vulnerabilities in REXML gem. These vulnerabilities have been assigned the CVE identifier [CVE-2024-41123](https://www.cve.org/CVERecord?id=CVE-2024-41123). We strongly recommend upgrading the REXML gem.
11+
REXML gem에서 DoS 취약점이 발견되었습니다. 이 취약점은 CVE 번호 [CVE-2024-41123](https://www.cve.org/CVERecord?id=CVE-2024-41123)로 등록되었습니다. REXML gem 업그레이드를 강하게 추천합니다.
1212

13-
## Details
13+
## 세부 내용
1414

15-
When parsing an XML document that has many specific characters such as whitespace character, `>]` and `]>`, REXML gem may take long time.
15+
공백 문자, `>]`, `]>`와 같은 특정 문자가 많이 포함된 XML 문서를 파싱할 때, REXML gem은 처리에 긴 시간이 걸립니다.
1616

17-
Please update REXML gem to version 3.3.3 or later.
17+
REXML gem을 3.3.3이나 그 이상으로 업데이트하세요.
1818

19-
## Affected versions
19+
## 해당 버전
2020

21-
* REXML gem 3.3.2 or prior
21+
* REXML gem 3.3.2와 그 이하
2222

23-
## Credits
23+
## 도움을 준 사람
2424

25-
Thanks to [mprogrammer](https://hackerone.com/mprogrammer) and [scyoon](https://hackerone.com/scyoon) for discovering these issues.
25+
이 문제를 발견해 준 [mprogrammer](https://hackerone.com/mprogrammer)[scyoon](https://hackerone.com/scyoon)에게 감사를 표합니다.
2626

27-
## History
27+
## 수정 이력
2828

29-
* Originally published at 2024-08-01 03:00:00 (UTC)
29+
* 2024-08-01 03:00:00 (UTC) 최초 공개
Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,29 @@
11
---
22
layout: news_post
3-
title: "CVE-2024-41946: DoS vulnerability in REXML"
3+
title: "CVE-2024-41946: REXML의 DoS 취약점"
44
author: "kou"
5-
translator:
5+
translator: "shia"
66
date: 2024-08-01 03:00:00 +0000
77
tags: security
8-
lang: en
8+
lang: ko
99
---
1010

11-
There is a DoS vulnerability in REXML gem. This vulnerability has been assigned the CVE identifier [CVE-2024-41946](https://www.cve.org/CVERecord?id=CVE-2024-41946). We strongly recommend upgrading the REXML gem.
11+
REXML gem에서 DoS 취약점이 발견되었습니다. 이 취약점은 CVE 번호 [CVE-2024-41946](https://www.cve.org/CVERecord?id=CVE-2024-41946)로 등록되었습니다. REXML gem 업그레이드를 강하게 추천합니다.
1212

13-
## Details
13+
## 세부 내용
1414

15-
When parsing an XML that has many entity expansions with SAX2 or pull parser API, REXML gem may take long time.
15+
SAX2나 pull parser API로 많은 엔티티 확장을 포함하는 XML을 파싱할 때, REXML gem은 처리에 긴 시간이 걸립니다.
1616

17-
Please update REXML gem to version 3.3.3 or later.
17+
REXML gem을 3.3.3이나 그 이상으로 업데이트하세요.
1818

19-
## Affected versions
19+
## 해당 버전
2020

21-
* REXML gem 3.3.2 or prior
21+
* REXML gem 3.3.2와 그 이하
2222

23-
## Credits
23+
## 도움을 준 사람
2424

25-
Thanks to [NAITOH Jun](https://github.com/naitoh) for discovering and fixing this issue.
25+
이 문제를 발견해 준 [NAITOH Jun](https://github.com/naitoh)에게 감사를 표합니다.
2626

27-
## History
27+
## 수정 이력
2828

29-
* Originally published at 2024-08-01 03:00:00 (UTC)
29+
* 2024-08-01 03:00:00 (UTC) 최초 공개

0 commit comments

Comments
 (0)