Ubuntu 5806-3: Ruby vulnerability | LinuxSecurity.com
==========================================================================
Ubuntu Security Notice USN-5806-3
March 20, 2023

ruby2.7 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Ruby could allow for internet traffic to be modified if
a vulnerable application processed malicious user input.

Software Description:
- ruby2.7: Object-oriented scripting language

Details:

USN-5806-1 fixed vulnerabilities in Ruby. This update fixes the problem
for Ubuntu 20.04 LTS.

Original advisory details:

 Hiroshi Tokumaru discovered that Ruby did not properly handle certain
 user input for applications which generate HTTP responses using cgi gem.
 An attacker could possibly use this issue to maliciously modify the
 response a user would receive from a vulnerable application.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  libruby2.7                      2.7.0-5ubuntu1.8
  ruby2.7                         2.7.0-5ubuntu1.8

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5806-3
  https://ubuntu.com/security/notices/USN-5806-1
  CVE-2021-33621

Package Information:
  https://launchpad.net/ubuntu/+source/ruby2.7/2.7.0-5ubuntu1.8

Ubuntu 5806-3: Ruby vulnerability

March 20, 2023
Ruby could allow for internet traffic to be modified if a vulnerable application processed malicious user input.

Summary

A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: Ruby could allow for internet traffic to be modified if a vulnerable application processed malicious user input. Software Description: - ruby2.7: Object-oriented scripting language Details: USN-5806-1 fixed vulnerabilities in Ruby. This update fixes the problem for Ubuntu 20.04 LTS. Original advisory details: Hiroshi Tokumaru discovered that Ruby did not properly handle certain user input for applications which generate HTTP responses using cgi gem. An attacker could possibly use this issue to maliciously modify the response a user would receive from a vulnerable application.

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: libruby2.7 2.7.0-5ubuntu1.8 ruby2.7 2.7.0-5ubuntu1.8 In general, a standard system update will make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-5806-3

https://ubuntu.com/security/notices/USN-5806-1

CVE-2021-33621

Severity
Ubuntu Security Notice USN-5806-3

Package Information

https://launchpad.net/ubuntu/+source/ruby2.7/2.7.0-5ubuntu1.8

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.