{"id":"USN-7091-1","summary":"ruby3.0, ruby3.2, ruby3.3 vulnerabilities","details":"It was discovered that Ruby incorrectly handled parsing of an XML document\nthat has specific XML characters in an attribute value using REXML gem. An\nattacker could use this issue to cause Ruby to crash, resulting in a denial\nof service. This issue only affected in Ubuntu 22.04 LTS and Ubuntu 24.04\nLTS. (CVE-2024-35176, CVE-2024-39908, CVE-2024-41123)\n\nIt was discovered that Ruby incorrectly handled parsing of an XML document\nthat has many entity expansions with SAX2 or pull parser API. An attacker\ncould use this issue to cause Ruby to crash, resulting in a denial of\nservice. (CVE-2024-41946)\n\nIt was discovered that Ruby incorrectly handled parsing of an XML document\nthat has many digits in a hex numeric character reference. An attacker\ncould use this issue to cause Ruby to crash, resulting in a denial of\nservice. (CVE-2024-49761)\n","modified":"2026-02-10T04:45:48Z","published":"2024-11-05T03:39:06Z","related":["UBUNTU-CVE-2024-35176","UBUNTU-CVE-2024-39908","UBUNTU-CVE-2024-41123","UBUNTU-CVE-2024-41946","UBUNTU-CVE-2024-49761"],"upstream":["CVE-2024-35176","CVE-2024-39908","CVE-2024-41123","CVE-2024-41946","CVE-2024-49761","UBUNTU-CVE-2024-35176","UBUNTU-CVE-2024-39908","UBUNTU-CVE-2024-41123","UBUNTU-CVE-2024-41946","UBUNTU-CVE-2024-49761"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7091-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-35176"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-39908"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-41123"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-41946"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-49761"}],"affected":[{"package":{"name":"ruby3.0","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/ruby3.0@3.0.2-7ubuntu2.8?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0.2-7ubuntu2.8"}]}],"versions":["3.0.2-5ubuntu1","3.0.2-7","3.0.2-7ubuntu2","3.0.2-7ubuntu2.1","3.0.2-7ubuntu2.2","3.0.2-7ubuntu2.3","3.0.2-7ubuntu2.4","3.0.2-7ubuntu2.5","3.0.2-7ubuntu2.6","3.0.2-7ubuntu2.7"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libruby3.0","binary_version":"3.0.2-7ubuntu2.8"},{"binary_name":"ruby3.0","binary_version":"3.0.2-7ubuntu2.8"},{"binary_name":"ruby3.0-dev","binary_version":"3.0.2-7ubuntu2.8"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-41946"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-49761"}],"ecosystem":"Ubuntu:22.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7091-1.json"}},{"package":{"name":"ruby3.2","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/ruby3.2@3.2.3-1ubuntu0.24.04.3?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.2.3-1ubuntu0.24.04.3"}]}],"versions":["3.2.3-1","3.2.3-1build2","3.2.3-1build3","3.2.3-1ubuntu0.24.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libruby3.2","binary_version":"3.2.3-1ubuntu0.24.04.3"},{"binary_name":"ruby3.2","binary_version":"3.2.3-1ubuntu0.24.04.3"},{"binary_name":"ruby3.2-dev","binary_version":"3.2.3-1ubuntu0.24.04.3"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-41946"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-49761"}],"ecosystem":"Ubuntu:24.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7091-1.json"}}],"schema_version":"1.7.3"}