Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

11 – 18 of 18 results


CVE-2023-28756

Medium priority

Some fixes available 8 of 16

A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time...

9 affected packages

jruby, ruby1.9.1, ruby2.0, ruby2.3, ruby2.5...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
jruby Needs evaluation Not in release Needs evaluation Needs evaluation Needs evaluation
ruby1.9.1 Not in release Not in release Not in release Not in release Not in release
ruby2.0 Not in release Not in release Not in release Not in release Not in release
ruby2.3 Not in release Not in release Not in release Not in release Fixed
ruby2.5 Not in release Not in release Not in release Fixed Ignored
ruby2.7 Not in release Not in release Fixed Not in release Ignored
ruby3.0 Not in release Fixed Not in release Not in release Not in release
ruby3.1 Not in release Not in release Not in release Not in release Ignored
rubygems Not affected Not affected Not in release Not in release Ignored
Show all 9 packages Show less packages

CVE-2023-28755

Medium priority

Some fixes available 8 of 19

A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI...

9 affected packages

jruby, ruby1.9.1, ruby2.0, ruby2.3, ruby2.5...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
jruby Needs evaluation Not in release Vulnerable Vulnerable Vulnerable
ruby1.9.1 Not in release Not in release Not in release Not in release Not in release
ruby2.0 Not in release Not in release Not in release Not in release Not in release
ruby2.3 Not in release Not in release Not in release Not in release Fixed
ruby2.5 Not in release Not in release Not in release Fixed Ignored
ruby2.7 Not in release Not in release Fixed Not in release Ignored
ruby3.0 Not in release Fixed Not in release Not in release Not in release
ruby3.1 Not in release Not in release Not in release Not in release Ignored
rubygems Not affected Vulnerable Not in release Not in release Ignored
Show all 9 packages Show less packages

CVE-2021-33621

Medium priority

Some fixes available 6 of 14

The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTTP response or to create...

8 affected packages

jruby, ruby1.9.1, ruby2.0, ruby2.3, ruby2.5...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
jruby Needs evaluation Not in release Needs evaluation Needs evaluation Needs evaluation
ruby1.9.1 Not in release Not in release Not in release Not in release
ruby2.0 Not in release Not in release Not in release Not in release
ruby2.3 Not in release Not in release Not in release Fixed
ruby2.5 Not in release Not in release Fixed Not in release
ruby2.7 Not in release Fixed Not in release Not in release
ruby3.0 Not in release Fixed Not in release Not in release Not in release
ruby3.1 Not in release Not in release Not in release Not in release Not in release
Show all 8 packages Show less packages

CVE-2022-28739

Low priority
Fixed

There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, and 3.1.x before 3.1.2. It occurs in String-to-Float conversion, including Kernel#Float and String#to_f.

4 affected packages

ruby2.3, ruby2.5, ruby2.7, ruby3.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
ruby2.3 Fixed
ruby2.5 Fixed
ruby2.7 Not in release Fixed
ruby3.0 Fixed
Show less packages

CVE-2022-28738

Medium priority
Fixed

A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations.

4 affected packages

ruby2.3, ruby2.5, ruby2.7, ruby3.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
ruby2.3 Not affected
ruby2.5 Not affected
ruby2.7 Not in release Not affected
ruby3.0 Fixed
Show less packages

CVE-2021-41819

Medium priority
Fixed

CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.

4 affected packages

ruby2.3, ruby2.5, ruby2.7, ruby3.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
ruby2.3 Fixed
ruby2.5 Fixed Ignored
ruby2.7 Fixed Ignored
ruby3.0 Fixed Ignored
Show less packages

CVE-2021-41817

Medium priority
Fixed

Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1.

4 affected packages

ruby2.3, ruby2.5, ruby2.7, ruby3.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
ruby2.3 Fixed
ruby2.5 Fixed Ignored
ruby2.7 Fixed Ignored
ruby3.0 Fixed Ignored
Show less packages

CVE-2021-41816

Medium priority
Fixed

CGI.escape_html in Ruby before 2.7.5 and 3.x before 3.0.3 has an integer overflow and resultant buffer overflow via a long string on platforms (such as Windows) where size_t and long have different numbers of bytes. This also...

4 affected packages

ruby2.3, ruby2.5, ruby2.7, ruby3.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
ruby2.3 Not affected
ruby2.5 Not affected Ignored
ruby2.7 Fixed Ignored
ruby3.0 Fixed Ignored
Show less packages