In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service (disk consumption).
{ "binaries": [ { "binary_name": "ruby-zip", "binary_version": "1.1.7-1" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-16892.json"
{ "binaries": [ { "binary_name": "ruby-zip", "binary_version": "1.2.1-1.1~build0.18.04.1" } ] }