USN-7091-1: Ruby vulnerabilities
5 November 2024
Several security issues were fixed in Ruby.
Releases
Packages
- ruby3.0 - Object-oriented scripting language
- ruby3.2 - Object-oriented scripting language
- ruby3.3 - Object-oriented scripting language
Details
It was discovered that Ruby incorrectly handled parsing of an XML document
that has specific XML characters in an attribute value using REXML gem. An
attacker could use this issue to cause Ruby to crash, resulting in a denial
of service. This issue only affected in Ubuntu 22.04 LTS and Ubuntu 24.04
LTS. (CVE-2024-35176, CVE-2024-39908, CVE-2024-41123)
It was discovered that Ruby incorrectly handled parsing of an XML document
that has many entity expansions with SAX2 or pull parser API. An attacker
could use this issue to cause Ruby to crash, resulting in a denial of
service. (CVE-2024-41946)
It was discovered that Ruby incorrectly handled parsing of an XML document
that has many digits in a hex numeric character reference. An attacker
could use this issue to cause Ruby to crash, resulting in a denial of
service. (CVE-2024-49761)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 24.10
Ubuntu 24.04
Ubuntu 22.04
In general, a standard system update will make all the necessary changes.
Related notices
- USN-7091-2: ruby2.7, libruby2.7, ruby2.7-dev, ruby2.7-doc