USN-5806-3

See a problem?
Source
https://ubuntu.com/security/notices/USN-5806-3
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5806-3.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5806-3
Related
Published
2023-03-20T17:24:47.681767Z
Modified
2023-03-20T17:24:47.681767Z
Summary
ruby2.7 vulnerability
Details

USN-5806-1 fixed vulnerabilities in Ruby. This update fixes the problem for Ubuntu 20.04 LTS.

Original advisory details:

Hiroshi Tokumaru discovered that Ruby did not properly handle certain user input for applications which generate HTTP responses using cgi gem. An attacker could possibly use this issue to maliciously modify the response a user would receive from a vulnerable application.

References

Affected packages

Ubuntu:20.04:LTS / ruby2.7

Package

Name
ruby2.7
Purl
pkg:deb/ubuntu/ruby2.7@2.7.0-5ubuntu1.8?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.0-5ubuntu1.8

Affected versions

2.*

2.7.0-1
2.7.0-2
2.7.0-3
2.7.0-4
2.7.0-4ubuntu1
2.7.0-5ubuntu1
2.7.0-5ubuntu1.1
2.7.0-5ubuntu1.2
2.7.0-5ubuntu1.3
2.7.0-5ubuntu1.4
2.7.0-5ubuntu1.5
2.7.0-5ubuntu1.6
2.7.0-5ubuntu1.7

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "ruby2.7-doc": "2.7.0-5ubuntu1.8",
            "ruby2.7-dbgsym": "2.7.0-5ubuntu1.8",
            "ruby2.7": "2.7.0-5ubuntu1.8",
            "libruby2.7": "2.7.0-5ubuntu1.8",
            "libruby2.7-dbgsym": "2.7.0-5ubuntu1.8",
            "ruby2.7-dev": "2.7.0-5ubuntu1.8"
        }
    ]
}