{"id":"USN-7091-2","summary":"ruby2.7 vulnerabilities","details":"USN-7091-1 fixed several vulnerabilities in Ruby. This update provides the\ncorresponding update for CVE-2024-35176, CVE-2024-41123, CVE-2024-41946 and \nCVE-2024-49761 for ruby2.7 in Ubuntu 20.04 LTS.\n\nOriginal advisory details:\n\n It was discovered that Ruby incorrectly handled parsing of an XML document\n that has specific XML characters in an attribute value using REXML gem. An\n attacker could use this issue to cause Ruby to crash, resulting in a\n denial of service. This issue only affected in Ubuntu 22.04 LTS and Ubuntu\n 24.04 LTS. (CVE-2024-35176, CVE-2024-39908, CVE-2024-41123)\n \n It was discovered that Ruby incorrectly handled parsing of an XML document\n that has many entity expansions with SAX2 or pull parser API. An attacker\n could use this issue to cause Ruby to crash, resulting in a denial of\n service. (CVE-2024-41946)\n \n It was discovered that Ruby incorrectly handled parsing of an XML document\n that has many digits in a hex numeric character reference. An attacker\n could use this issue to cause Ruby to crash, resulting in a denial of\n service. (CVE-2024-49761)\n","modified":"2026-04-24T10:02:27.805667842Z","published":"2024-11-21T03:39:20Z","related":["UBUNTU-CVE-2024-35176","UBUNTU-CVE-2024-41123","UBUNTU-CVE-2024-41946","UBUNTU-CVE-2024-49761"],"upstream":["CVE-2024-49761","UBUNTU-CVE-2024-49761"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7091-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-49761"},{"type":"REPORT","url":"https://launchpad.net/bugs/2086615"}],"affected":[{"package":{"name":"ruby2.7","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/ruby2.7@2.7.0-5ubuntu1.15?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.7.0-5ubuntu1.15"}]}],"versions":["2.7.0-1","2.7.0-2","2.7.0-3","2.7.0-4","2.7.0-4ubuntu1","2.7.0-5ubuntu1","2.7.0-5ubuntu1.1","2.7.0-5ubuntu1.2","2.7.0-5ubuntu1.3","2.7.0-5ubuntu1.4","2.7.0-5ubuntu1.5","2.7.0-5ubuntu1.6","2.7.0-5ubuntu1.7","2.7.0-5ubuntu1.8","2.7.0-5ubuntu1.9","2.7.0-5ubuntu1.10","2.7.0-5ubuntu1.11","2.7.0-5ubuntu1.12","2.7.0-5ubuntu1.13","2.7.0-5ubuntu1.14"],"ecosystem_specific":{"binaries":[{"binary_name":"libruby2.7","binary_version":"2.7.0-5ubuntu1.15"},{"binary_name":"ruby2.7","binary_version":"2.7.0-5ubuntu1.15"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-49761"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7091-2.json"}}],"schema_version":"1.7.5"}