-----BEGIN PGP SIGNATURE-----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=RsfM
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6838-1
June 17, 2024
ruby2.7, ruby3.0, ruby3.1, ruby3.2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in Ruby.
Software Description:
- ruby3.2: Object-oriented scripting language
- ruby3.1: Object-oriented scripting language
- ruby3.0: Object-oriented scripting language
- ruby2.7: Object-oriented scripting language
Details:
It was discovered that Ruby RDoc incorrectly parsed certain YAML files. If
a user or automated system were tricked into parsing a specially crafted
.rdoc_options file, a remote attacker could possibly use this issue to
execute arbitrary code. (CVE-2024-27281)
It was discovered that the Ruby regex compiler incorrectly handled certain
memory operations. A remote attacker could possibly use this issue to
obtain sensitive memory contents. (CVE-2024-27282)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
libruby3.2 3.2.3-1ubuntu0.24.04.1
ruby3.2 3.2.3-1ubuntu0.24.04.1
Ubuntu 23.10
libruby3.1 3.1.2-7ubuntu3.2
ruby3.1 3.1.2-7ubuntu3.2
Ubuntu 22.04 LTS
libruby3.0 3.0.2-7ubuntu2.6
ruby3.0 3.0.2-7ubuntu2.6
Ubuntu 20.04 LTS
libruby2.7 2.7.0-5ubuntu1.13
ruby2.7 2.7.0-5ubuntu1.13
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6838-1
CVE-2024-27281, CVE-2024-27282
Package Information:
https://launchpad.net/ubuntu/+source/ruby3.2/3.2.3-1ubuntu0.24.04.1
https://launchpad.net/ubuntu/+source/ruby3.1/3.1.2-7ubuntu3.2
https://launchpad.net/ubuntu/+source/ruby3.0/3.0.2-7ubuntu2.6
https://launchpad.net/ubuntu/+source/ruby2.7/2.7.0-5ubuntu1.13
No comments:
Post a Comment