[USN-4882-1] Ruby vulnerabilities
Several security issues were fixed in Ruby.
It was discovered that the Ruby JSON gem incorrectly handled certain JSON
files. If a user or automated system were tricked into parsing a specially
crafted JSON file, a remote attacker could use this issue to execute
arbitrary code. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04
LTS. (CVE-2020-10663)
It was discovered that Ruby incorrectly handled certain socket memory
operations. A remote attacker could possibly use this issue to obtain
sensitive information. This issue only affected Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-10933)
It was discovered that Ruby incorrectly handled certain transfer-encoding
headers when using Webrick. A remote attacker could possibly use this issue
to bypass a reverse proxy. (CVE-2020-25613)
- ID
- USN-4882-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-4882-1
- Published
-
2021-03-18T17:00:33
(3 years ago) - Modified
-
2021-03-18T17:00:33
(3 years ago) - Other Advisories
-
- ALAS-2020-1416
- ALAS-2020-1422
- ALAS-2020-1423
- ALAS-2020-1426
- ALAS-2020-1451
- ALAS-2021-1468
- ALAS2-2021-1641
- ALPINE:CVE-2020-10663
- ALPINE:CVE-2020-10933
- ALPINE:CVE-2020-25613
- ALSA-2021:2584
- ALSA-2021:2587
- ALSA-2021:2588
- DSA-4721-1
- ELSA-2020-5724
- ELSA-2021-2584
- ELSA-2021-2587
- ELSA-2021-2588
- FEDORA-2020-02ca18c2a0
- FEDORA-2020-26df92331a
- FEDORA-2020-a95706b117
- FEDORA-2020-d171bf636d
- FEDORA-2020-fe2a7d7390
- FREEBSD:40194E1C-6D89-11EA-8082-80EE73419AF3
- GLSA-202401-27
- MS:CVE-2020-10933
- MS:CVE-2020-25613
- openSUSE-SU-2020:0586-1
- openSUSE-SU-2021:0471-1
- RHSA-2020:2462
- RHSA-2021:2584
- RHSA-2021:2587
- RHSA-2021:2588
- RLSA-2021:2584
- RLSA-2021:2587
- RLSA-2021:2588
- RUBYSEC:JSON-2020-10663
- RUBYSEC:WEBRICK-2020-25613
- SUSE-SU-2020:0995-1
- SUSE-SU-2020:1570-1
- SUSE-SU-2020:1901-1
- SUSE-SU-2021:0933-1
- SUSE-SU-2021:3837-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/ruby2.7?distro=groovy | ubuntu | ruby2.7 | < 2.7.1-3ubuntu1.2 | groovy | ||
Affected | pkg:deb/ubuntu/ruby2.7?distro=focal | ubuntu | ruby2.7 | < 2.7.0-5ubuntu1.3 | focal | ||
Affected | pkg:deb/ubuntu/ruby2.7-doc?distro=groovy | ubuntu | ruby2.7-doc | < 2.7.1-3ubuntu1.2 | groovy | ||
Affected | pkg:deb/ubuntu/ruby2.7-doc?distro=focal | ubuntu | ruby2.7-doc | < 2.7.0-5ubuntu1.3 | focal | ||
Affected | pkg:deb/ubuntu/ruby2.7-dev?distro=groovy | ubuntu | ruby2.7-dev | < 2.7.1-3ubuntu1.2 | groovy | ||
Affected | pkg:deb/ubuntu/ruby2.7-dev?distro=focal | ubuntu | ruby2.7-dev | < 2.7.0-5ubuntu1.3 | focal | ||
Affected | pkg:deb/ubuntu/ruby2.5?distro=bionic | ubuntu | ruby2.5 | < 2.5.1-1ubuntu1.8 | bionic | ||
Affected | pkg:deb/ubuntu/ruby2.5-doc?distro=bionic | ubuntu | ruby2.5-doc | < 2.5.1-1ubuntu1.8 | bionic | ||
Affected | pkg:deb/ubuntu/ruby2.5-dev?distro=bionic | ubuntu | ruby2.5-dev | < 2.5.1-1ubuntu1.8 | bionic | ||
Affected | pkg:deb/ubuntu/ruby2.3?distro=xenial | ubuntu | ruby2.3 | < 2.3.1-2~ubuntu16.04.15 | xenial | ||
Affected | pkg:deb/ubuntu/ruby2.3-tcltk?distro=xenial | ubuntu | ruby2.3-tcltk | < 2.3.1-2~ubuntu16.04.15 | xenial | ||
Affected | pkg:deb/ubuntu/ruby2.3-doc?distro=xenial | ubuntu | ruby2.3-doc | < 2.3.1-2~ubuntu16.04.15 | xenial | ||
Affected | pkg:deb/ubuntu/ruby2.3-dev?distro=xenial | ubuntu | ruby2.3-dev | < 2.3.1-2~ubuntu16.04.15 | xenial | ||
Affected | pkg:deb/ubuntu/libruby2.7?distro=groovy | ubuntu | libruby2.7 | < 2.7.1-3ubuntu1.2 | groovy | ||
Affected | pkg:deb/ubuntu/libruby2.7?distro=focal | ubuntu | libruby2.7 | < 2.7.0-5ubuntu1.3 | focal | ||
Affected | pkg:deb/ubuntu/libruby2.5?distro=bionic | ubuntu | libruby2.5 | < 2.5.1-1ubuntu1.8 | bionic | ||
Affected | pkg:deb/ubuntu/libruby2.3?distro=xenial | ubuntu | libruby2.3 | < 2.3.1-2~ubuntu16.04.15 | xenial |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |