UBUNTU-CVE-2024-49761

Source
https://ubuntu.com/security/CVE-2024-49761
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-49761.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2024-49761
Upstream
Downstream
Related
Published
2024-10-28T15:15:00Z
Modified
2026-01-20T19:30:49.502417Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • 6.6 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

REXML is an XML toolkit for Ruby. The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between &# and x...; in a hex numeric character reference (&#x...;). This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. The REXML gem 3.3.9 or later include the patch to fix the vulnerability.

References

Affected packages

Ubuntu:Pro:16.04:LTS / ruby2.3

Package

Name
ruby2.3
Purl
pkg:deb/ubuntu/ruby2.3@2.3.1-2~ubuntu16.04.16+esm10?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.1-2~ubuntu16.04.16+esm10

Affected versions

2.*

2.3.0-1
2.3.0-2
2.3.0-4ubuntu2
2.3.0-4ubuntu3
2.3.0-5ubuntu1
2.3.1-2~16.04
2.3.1-2~16.04.2
2.3.1-2~16.04.4
2.3.1-2~16.04.5
2.3.1-2~16.04.6
2.3.1-2~16.04.7
2.3.1-2~16.04.9
2.3.1-2~16.04.10
2.3.1-2~16.04.11
2.3.1-2~16.04.12
2.3.1-2~ubuntu16.04.13
2.3.1-2~ubuntu16.04.14
2.3.1-2~ubuntu16.04.15
2.3.1-2~ubuntu16.04.16
2.3.1-2~ubuntu16.04.16+esm1
2.3.1-2~ubuntu16.04.16+esm2
2.3.1-2~ubuntu16.04.16+esm3
2.3.1-2~ubuntu16.04.16+esm4
2.3.1-2~ubuntu16.04.16+esm5
2.3.1-2~ubuntu16.04.16+esm6
2.3.1-2~ubuntu16.04.16+esm7
2.3.1-2~ubuntu16.04.16+esm8
2.3.1-2~ubuntu16.04.16+esm9

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.3.1-2~ubuntu16.04.16+esm10",
            "binary_name": "libruby2.3"
        },
        {
            "binary_version": "2.3.1-2~ubuntu16.04.16+esm10",
            "binary_name": "ruby2.3"
        },
        {
            "binary_version": "2.3.1-2~ubuntu16.04.16+esm10",
            "binary_name": "ruby2.3-dev"
        },
        {
            "binary_version": "2.3.1-2~ubuntu16.04.16+esm10",
            "binary_name": "ruby2.3-tcltk"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-49761.json"

Ubuntu:Pro:18.04:LTS / ruby2.5

Package

Name
ruby2.5
Purl
pkg:deb/ubuntu/ruby2.5@2.5.1-1ubuntu1.16+esm4?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5.1-1ubuntu1.16+esm4

Affected versions

2.*

2.5.0~preview1-1ubuntu2
2.5.0-4ubuntu1
2.5.0-4ubuntu4
2.5.0-5ubuntu1
2.5.0-6ubuntu1
2.5.1-1ubuntu1
2.5.1-1ubuntu1.1
2.5.1-1ubuntu1.2
2.5.1-1ubuntu1.4
2.5.1-1ubuntu1.5
2.5.1-1ubuntu1.6
2.5.1-1ubuntu1.7
2.5.1-1ubuntu1.8
2.5.1-1ubuntu1.9
2.5.1-1ubuntu1.10
2.5.1-1ubuntu1.11
2.5.1-1ubuntu1.12
2.5.1-1ubuntu1.13
2.5.1-1ubuntu1.14
2.5.1-1ubuntu1.15
2.5.1-1ubuntu1.16
2.5.1-1ubuntu1.16+esm1
2.5.1-1ubuntu1.16+esm3

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.5.1-1ubuntu1.16+esm4",
            "binary_name": "libruby2.5"
        },
        {
            "binary_version": "2.5.1-1ubuntu1.16+esm4",
            "binary_name": "ruby2.5"
        },
        {
            "binary_version": "2.5.1-1ubuntu1.16+esm4",
            "binary_name": "ruby2.5-dev"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-49761.json"

Ubuntu:20.04:LTS / ruby2.7

Package

Name
ruby2.7
Purl
pkg:deb/ubuntu/ruby2.7@2.7.0-5ubuntu1.15?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.0-5ubuntu1.15

Affected versions

2.*

2.7.0-1
2.7.0-2
2.7.0-3
2.7.0-4
2.7.0-4ubuntu1
2.7.0-5ubuntu1
2.7.0-5ubuntu1.1
2.7.0-5ubuntu1.2
2.7.0-5ubuntu1.3
2.7.0-5ubuntu1.4
2.7.0-5ubuntu1.5
2.7.0-5ubuntu1.6
2.7.0-5ubuntu1.7
2.7.0-5ubuntu1.8
2.7.0-5ubuntu1.9
2.7.0-5ubuntu1.10
2.7.0-5ubuntu1.11
2.7.0-5ubuntu1.12
2.7.0-5ubuntu1.13
2.7.0-5ubuntu1.14

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.7.0-5ubuntu1.15",
            "binary_name": "libruby2.7"
        },
        {
            "binary_version": "2.7.0-5ubuntu1.15",
            "binary_name": "ruby2.7"
        },
        {
            "binary_version": "2.7.0-5ubuntu1.15",
            "binary_name": "ruby2.7-dev"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-49761.json"

Ubuntu:22.04:LTS / ruby3.0

Package

Name
ruby3.0
Purl
pkg:deb/ubuntu/ruby3.0@3.0.2-7ubuntu2.8?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.2-7ubuntu2.8

Affected versions

3.*

3.0.2-5ubuntu1
3.0.2-7
3.0.2-7ubuntu2
3.0.2-7ubuntu2.1
3.0.2-7ubuntu2.2
3.0.2-7ubuntu2.3
3.0.2-7ubuntu2.4
3.0.2-7ubuntu2.5
3.0.2-7ubuntu2.6
3.0.2-7ubuntu2.7

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.0.2-7ubuntu2.8",
            "binary_name": "libruby3.0"
        },
        {
            "binary_version": "3.0.2-7ubuntu2.8",
            "binary_name": "ruby3.0"
        },
        {
            "binary_version": "3.0.2-7ubuntu2.8",
            "binary_name": "ruby3.0-dev"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-49761.json"

Ubuntu:24.04:LTS / ruby3.2

Package

Name
ruby3.2
Purl
pkg:deb/ubuntu/ruby3.2@3.2.3-1ubuntu0.24.04.3?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.3-1ubuntu0.24.04.3

Affected versions

3.*

3.2.3-1
3.2.3-1build2
3.2.3-1build3
3.2.3-1ubuntu0.24.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.2.3-1ubuntu0.24.04.3",
            "binary_name": "libruby3.2"
        },
        {
            "binary_version": "3.2.3-1ubuntu0.24.04.3",
            "binary_name": "ruby3.2"
        },
        {
            "binary_version": "3.2.3-1ubuntu0.24.04.3",
            "binary_name": "ruby3.2-dev"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-49761.json"