USN-5806-1 fixed vulnerabilities in Ruby. This update fixes the problem for Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.10.
Original advisory details:
Hiroshi Tokumaru discovered that Ruby did not properly handle certain user input for applications which generate HTTP responses using cgi gem. An attacker could possibly use this issue to maliciously modify the response a user would receive from a vulnerable application.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.5.1-1ubuntu1.13", "binary_name": "libruby2.5" }, { "binary_version": "2.5.1-1ubuntu1.13", "binary_name": "libruby2.5-dbgsym" }, { "binary_version": "2.5.1-1ubuntu1.13", "binary_name": "ruby2.5" }, { "binary_version": "2.5.1-1ubuntu1.13", "binary_name": "ruby2.5-dbgsym" }, { "binary_version": "2.5.1-1ubuntu1.13", "binary_name": "ruby2.5-dev" }, { "binary_version": "2.5.1-1ubuntu1.13", "binary_name": "ruby2.5-doc" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "3.0.2-7ubuntu2.3", "binary_name": "libruby3.0" }, { "binary_version": "3.0.2-7ubuntu2.3", "binary_name": "libruby3.0-dbgsym" }, { "binary_version": "3.0.2-7ubuntu2.3", "binary_name": "ruby3.0" }, { "binary_version": "3.0.2-7ubuntu2.3", "binary_name": "ruby3.0-dbgsym" }, { "binary_version": "3.0.2-7ubuntu2.3", "binary_name": "ruby3.0-dev" }, { "binary_version": "3.0.2-7ubuntu2.3", "binary_name": "ruby3.0-doc" } ] }