USN-7394-1

Source
https://ubuntu.com/security/notices/USN-7394-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7394-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-7394-1
Related
Published
2025-03-31T01:29:40.027488Z
Modified
2025-03-31T01:29:40.027488Z
Summary
ruby-doorkeeper vulnerabilities
Details

Jonathan Clem and Justin Bull discovered that Doorkeeper could allow arbitrary token revocation and replay attacks. An attacker could possibly use this issue to gain unauthorized access to a system. (CVE-2016-6582)

It was discovered that Doorkeeper incorrectly handled storing client names. An attacker could possibly use this issue to execute a cross-site scripting (XSS) attack. (CVE-2018-1000088)

References

Affected packages

Ubuntu:Pro:16.04:LTS / ruby-doorkeeper

Package

Name
ruby-doorkeeper
Purl
pkg:deb/ubuntu/ruby-doorkeeper@2.2.1-1ubuntu0.1~esm2?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.1-1ubuntu0.1~esm2

Affected versions

2.*

2.2.1-1
2.2.1-1ubuntu0.1~esm1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "2.2.1-1ubuntu0.1~esm2",
            "binary_name": "ruby-doorkeeper"
        }
    ]
}