USN-6219-1: Ruby vulnerabilities
12 July 2023
Several security issues were fixed in Ruby.
Releases
Packages
- ruby2.3 - Object-oriented scripting language
- ruby2.5 - Object-oriented scripting language
- ruby2.7 - Object-oriented scripting language
- ruby3.0 - Interpreter of object-oriented scripting language Ruby
- ruby3.1 - Interpreter of object-oriented scripting language Ruby
Details
It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 20.10 and Ubuntu 20.04 LTS.
(CVE-2023-28755)
It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a denial of service.
This issue exists because of an incomplete fix for CVE-2023-28755.
(CVE-2023-36617)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.04
Ubuntu 22.10
Ubuntu 22.04
Ubuntu 20.04
Ubuntu 18.04
-
ruby2.5
-
2.5.1-1ubuntu1.16+esm1
Available with Ubuntu Pro
-
libruby2.5
-
2.5.1-1ubuntu1.16+esm1
Available with Ubuntu Pro
Ubuntu 16.04
-
libruby2.3
-
2.3.1-2~ubuntu16.04.16+esm8
Available with Ubuntu Pro
-
ruby2.3
-
2.3.1-2~ubuntu16.04.16+esm8
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-6055-1: ruby2.3-tcltk, ruby2.5, ruby2.7, ruby2.3-doc, ruby2.7-dev, ruby2.7-doc, ruby2.5-doc, libruby2.5, ruby2.5-dev, libruby2.7, ruby2.3-dev, libruby2.3, ruby2.3
- USN-6055-2: ruby2.3-tcltk, ruby2.5, ruby2.7, ruby2.3-doc, ruby2.7-dev, ruby2.7-doc, ruby2.5-doc, libruby2.5, ruby2.5-dev, libruby2.7, ruby2.3-dev, libruby2.3, ruby2.3
- USN-6087-1: ruby2.3-tcltk, ruby2.5, ruby2.7, ruby2.3-doc, ruby2.7-dev, ruby2.7-doc, ruby2.5-doc, libruby2.5, ruby2.5-dev, libruby2.7, ruby2.3-dev, libruby2.3, ruby2.3
- USN-6181-1: ruby3.1, ruby3.1-dev, libruby3.1, ruby3.1-doc