CVE-2024-35176
Publication date 16 May 2024
Last updated 27 October 2025
Ubuntu priority
Cvss 3 Severity Score
Description
REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an attribute value. Those who need to parse untrusted XMLs may be impacted to this vulnerability. The REXML gem 3.2.7 or later include the patch to fix this vulnerability. As a workaround, don't parse untrusted XMLs.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| ruby2.3 | 25.10 questing | Not in release |
| 25.04 plucky | Not in release | |
| 24.04 LTS noble | Not in release | |
| 22.04 LTS jammy | Not in release | |
| 20.04 LTS focal | Not in release | |
| 16.04 LTS xenial |
Fixed 2.3.1-2~ubuntu16.04.16+esm11
|
|
| ruby2.5 | 25.10 questing | Not in release |
| 25.04 plucky | Not in release | |
| 24.04 LTS noble | Not in release | |
| 22.04 LTS jammy | Not in release | |
| 20.04 LTS focal | Not in release | |
| 18.04 LTS bionic |
Fixed 2.5.1-1ubuntu1.16+esm5
|
|
| ruby2.7 | 25.10 questing | Not in release |
| 25.04 plucky | Not in release | |
| 24.04 LTS noble | Not in release | |
| 22.04 LTS jammy | Not in release | |
| 20.04 LTS focal |
Fixed 2.7.0-5ubuntu1.16
|
|
| ruby3.0 | 25.10 questing | Not in release |
| 25.04 plucky | Not in release | |
| 24.04 LTS noble | Not in release | |
| 22.04 LTS jammy |
Fixed 3.0.2-7ubuntu2.10
|
|
| 20.04 LTS focal | Not in release | |
| ruby3.2 | 25.10 questing | Not in release |
| 25.04 plucky | Not in release | |
| 24.04 LTS noble |
Fixed 3.2.3-1ubuntu0.24.04.5
|
|
| 22.04 LTS jammy | Not in release | |
| 20.04 LTS focal | Not in release | |
| ruby3.3 | 25.10 questing |
Not affected
|
| 25.04 plucky |
Not affected
|
|
| 24.04 LTS noble | Not in release | |
| 22.04 LTS jammy | Not in release | |
| 20.04 LTS focal | Not in release | |
| jruby | 25.10 questing |
Needs evaluation
|
| 25.04 plucky |
Needs evaluation
|
|
| 24.04 LTS noble |
Needs evaluation
|
|
| 22.04 LTS jammy | Not in release | |
| 20.04 LTS focal |
Needs evaluation
|
|
| 18.04 LTS bionic |
Needs evaluation
|
|
| 16.04 LTS xenial |
Needs evaluation
|
|
| 14.04 LTS trusty |
Needs evaluation
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu Pro 30-day free trialNotes
mdeslaur
While this was claimed to be fixed in USN-7091-1 and USN-7091-2, the patch was incomplete. For focal, it was actually fixed in USN-7256-1. For other releases, it was fixed in USN-7418-1.
Patch details
| Package | Patch details |
|---|---|
| ruby2.3 | |
| ruby3.2 |
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity impact | None |
| Availability impact | Low |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
References
Related Ubuntu Security Notices (USN)
- USN-7091-1
- Ruby vulnerabilities
- 5 November 2024
- USN-7091-2
- Ruby vulnerabilities
- 21 November 2024
- USN-7418-1
- Ruby vulnerabilities
- 7 April 2025
- USN-7734-1
- Ruby vulnerabilities
- 3 September 2025
- USN-7840-1
- Ruby vulnerabilities
- 27 October 2025