USN-5806-1

Source
https://ubuntu.com/security/notices/USN-5806-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-5806-1.json
Related
Published
2023-01-17T15:59:06.950739Z
Modified
2023-01-17T15:59:06.950739Z
Summary
ruby2.3 vulnerability
Details

Hiroshi Tokumaru discovered that Ruby did not properly handle certain user input for applications which generate HTTP responses using cgi gem. An attacker could possibly use this issue to maliciously modify the response a user would receive from a vulnerable application.

References

Affected packages

Ubuntu:Pro:16.04:LTS / ruby2.3

Package

Name
ruby2.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
2.3.1-2~ubuntu16.04.16+esm4

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "ruby2.3-doc": "2.3.1-2~ubuntu16.04.16+esm4",
            "ruby2.3-dev": "2.3.1-2~ubuntu16.04.16+esm4",
            "ruby2.3-tcltk": "2.3.1-2~ubuntu16.04.16+esm4",
            "libruby2.3": "2.3.1-2~ubuntu16.04.16+esm4",
            "ruby2.3": "2.3.1-2~ubuntu16.04.16+esm4"
        }
    ]
}