It was discovered that Ruby incorrectly handled certain files. An attacker could possibly use this issue to pass path matching what can lead to an unauthorized access. (CVE-2019-15845)
It was discovered that Ruby incorrectly handled certain regular expressions. An attacker could use this issue to cause a denial of service. (CVE-2019-16201)
It was discovered that Ruby incorrectly handled certain HTTP headers. An attacker could possibly use this issue to execute arbitrary code. (CVE-2019-16254)
It was discovered that Ruby incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code. (CVE-2019-16255)
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libruby2.3", "binary_version": "2.3.1-2~ubuntu16.04.14" }, { "binary_name": "libruby2.3-dbg", "binary_version": "2.3.1-2~ubuntu16.04.14" }, { "binary_name": "libruby2.3-dbgsym", "binary_version": "2.3.1-2~ubuntu16.04.14" }, { "binary_name": "ruby2.3", "binary_version": "2.3.1-2~ubuntu16.04.14" }, { "binary_name": "ruby2.3-dbgsym", "binary_version": "2.3.1-2~ubuntu16.04.14" }, { "binary_name": "ruby2.3-dev", "binary_version": "2.3.1-2~ubuntu16.04.14" }, { "binary_name": "ruby2.3-dev-dbgsym", "binary_version": "2.3.1-2~ubuntu16.04.14" }, { "binary_name": "ruby2.3-doc", "binary_version": "2.3.1-2~ubuntu16.04.14" }, { "binary_name": "ruby2.3-tcltk", "binary_version": "2.3.1-2~ubuntu16.04.14" }, { "binary_name": "ruby2.3-tcltk-dbgsym", "binary_version": "2.3.1-2~ubuntu16.04.14" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libruby2.5", "binary_version": "2.5.1-1ubuntu1.6" }, { "binary_name": "libruby2.5-dbgsym", "binary_version": "2.5.1-1ubuntu1.6" }, { "binary_name": "ruby2.5", "binary_version": "2.5.1-1ubuntu1.6" }, { "binary_name": "ruby2.5-dbgsym", "binary_version": "2.5.1-1ubuntu1.6" }, { "binary_name": "ruby2.5-dev", "binary_version": "2.5.1-1ubuntu1.6" }, { "binary_name": "ruby2.5-doc", "binary_version": "2.5.1-1ubuntu1.6" } ] }