Wednesday, April 1, 2026

[USN-8137-1] Ruby vulnerability

==========================================================================
Ubuntu Security Notice USN-8137-1
March 31, 2026

ruby2.3, ruby2.5, ruby2.7, ruby3.0, ruby3.2, ruby3.3 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Ruby could be made to expose sensitive information.

Software Description:
- ruby3.3: Object-oriented scripting language
- ruby3.2: Object-oriented scripting language
- ruby3.0: Object-oriented scripting language
- ruby2.7: Object-oriented scripting language
- ruby2.5: Object-oriented scripting language
- ruby2.3: Object-oriented scripting language

Details:

It was discovered that the Ruby URI gem did not properly handle sensitive
information when combining URIs. A remote attacker could possibly use this
issue to leak authentication credentials.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
libruby3.3 3.3.8-2ubuntu2.1
ruby3.3 3.3.8-2ubuntu2.1

Ubuntu 24.04 LTS
libruby3.2 3.2.3-1ubuntu0.24.04.7
ruby3.2 3.2.3-1ubuntu0.24.04.7

Ubuntu 22.04 LTS
libruby3.0 3.0.2-7ubuntu2.12
ruby3.0 3.0.2-7ubuntu2.12

Ubuntu 20.04 LTS
libruby2.7 2.7.0-5ubuntu1.18+esm4
Available with Ubuntu Pro
ruby2.7 2.7.0-5ubuntu1.18+esm4
Available with Ubuntu Pro

Ubuntu 18.04 LTS
libruby2.5 2.5.1-1ubuntu1.16+esm7
Available with Ubuntu Pro
ruby2.5 2.5.1-1ubuntu1.16+esm7
Available with Ubuntu Pro

Ubuntu 16.04 LTS
libruby2.3 2.3.1-2~ubuntu16.04.16+esm12
Available with Ubuntu Pro
ruby2.3 2.3.1-2~ubuntu16.04.16+esm12
Available with Ubuntu Pro
ruby2.3-tcltk 2.3.1-2~ubuntu16.04.16+esm12
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8137-1
CVE-2025-61594

Package Information:
https://launchpad.net/ubuntu/+source/ruby3.3/3.3.8-2ubuntu2.1
https://launchpad.net/ubuntu/+source/ruby3.2/3.2.3-1ubuntu0.24.04.7
https://launchpad.net/ubuntu/+source/ruby3.0/3.0.2-7ubuntu2.12

[USN-8089-2] Go Networking vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8089-2
March 31, 2026

golang-golang-x-net-dev vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in Go Networking

Software Description:
- golang-golang-x-net-dev: Supplementary Go networking development files

Details:

USN-8089-1 fixed vulnerabilities in Go Networking. This update provides
the corresponding update to code vendored in golang-golang-x-net-dev.

Original advisory details:

Bahruz Jabiyev, Tommaso Innocenti, Anthony Gavazzi, Steven Sprecher, and
Kaan Onarlioglu discovered that servers using Go Networking could hang
during shutdown if preempted by a fatal error. An attacker could possibly
use this to cause a denial of service. This issue only affected Ubuntu
22.04 LTS. (CVE-2022-27664)

Arpad Ryszka and Jakob Ackermann discovered that a maliciously crafted
stream could cause excessive CPU usage in Go Networking's HPACK decoder. An
attacker could possibly use this to cause a denial of service. This issue
only affected Ubuntu 22.04 LTS. (CVE-2022-41723)

Mohammad Thoriq Aziz discovered that Go Networking did not properly
sanitize some text nodes. An attacker could possibly use this to execute
arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-3978)

Sean Ng discovered an error in Go Networking's HTML tag handling. An
attacker could possibly use this to cause a denial of service.
(CVE-2025-22872)

Guido Vranken and Jakub Ciolek discovered that a maliciously crafted HTML
document could exhaust system resources on servers using Go Networking. An
attacker could possibly use this to cause a denial of service.
(CVE-2025-47911)

Guido Vranken discovered that a maliciously crafted HTML document could put
servers using Go Networking into an infinite loop. An attacker could
possibly use this to cause a denial of service. (CVE-2025-58190)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
golang-go.net-dev 1:0.0+git20190811.74dc4d7+dfsg-1ubuntu0.1~esm2
Available with Ubuntu Pro
golang-golang-x-net-dev 1:0.0+git20190811.74dc4d7+dfsg-1ubuntu0.1~esm2
Available with Ubuntu Pro

Ubuntu 18.04 LTS
golang-go.net-dev 1:0.0+git20170629.c81e7f2+dfsg-2ubuntu0.1~esm2
Available with Ubuntu Pro
golang-golang-x-net-dev 1:0.0+git20170629.c81e7f2+dfsg-2ubuntu0.1~esm2
Available with Ubuntu Pro

Ubuntu 16.04 LTS
golang-go.net-dev 1:0.0+git20160110.4fd4a9f-1ubuntu0.1~esm2
Available with Ubuntu Pro
golang-golang-x-net-dev 1:0.0+git20160110.4fd4a9f-1ubuntu0.1~esm2
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8089-2
https://ubuntu.com/security/notices/USN-8089-1
CVE-2021-33194, CVE-2022-27664, CVE-2022-41723, CVE-2023-3978,
CVE-2025-22872, CVE-2025-47911, CVE-2025-58190