-
Notifications
You must be signed in to change notification settings - Fork 0
/
USN-5806-2.json
83 lines (83 loc) · 2.23 KB
/
USN-5806-2.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
{
"id": "USN-5806-2",
"summary": "ruby2.5, ruby3.0 vulnerability",
"details": "USN-5806-1 fixed vulnerabilities in Ruby. This update fixes the problem\nfor Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.10.\n\nOriginal advisory details:\n\n Hiroshi Tokumaru discovered that Ruby did not properly handle certain\n user input for applications which generate HTTP responses using cgi gem.\n An attacker could possibly use this issue to maliciously modify the\n response a user would receive from a vulnerable application.\n",
"aliases": [],
"related": [
"CVE-2021-33621"
],
"published": "2023-01-23T14:41:40.629687Z",
"modified": "2023-01-23T14:41:40.629687Z",
"affected": [
{
"package": {
"ecosystem": "Ubuntu:22.04:LTS",
"name": "ruby3.0"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "3.0.2-7ubuntu2.3"
}
]
}
],
"ecosystem_specific": {
"binaries": [
{
"libruby3.0": "3.0.2-7ubuntu2.3",
"ruby3.0": "3.0.2-7ubuntu2.3",
"ruby3.0-doc": "3.0.2-7ubuntu2.3",
"ruby3.0-dev": "3.0.2-7ubuntu2.3"
}
],
"availability": "No subscription needed"
}
},
{
"package": {
"ecosystem": "Ubuntu:18.04:LTS",
"name": "ruby2.5"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "2.5.1-1ubuntu1.13"
}
]
}
],
"ecosystem_specific": {
"binaries": [
{
"libruby2.5": "2.5.1-1ubuntu1.13",
"ruby2.5": "2.5.1-1ubuntu1.13",
"ruby2.5-doc": "2.5.1-1ubuntu1.13",
"ruby2.5-dev": "2.5.1-1ubuntu1.13"
}
],
"availability": "No subscription needed"
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://ubuntu.com/security/notices/USN-5806-2"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2021-33621"
}
]
}