Ubuntu Security Notice 6087-1 - It was discovered that Ruby incorrectly handled certain regular expressions. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 ESM.
cc361b6847f2850db6412282b2a465949ce6e489bc3be40573658c7db61eda9b
=========================================================================
Ubuntu Security Notice USN-6087-1
May 18, 2023
ruby2.3, ruby2.5, ruby2.7 vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
Summary:
Several security issues were fixed in Ruby.
Software Description:
- ruby2.7: Object-oriented scripting language
- ruby2.5: Object-oriented scripting language
- ruby2.3: Object-oriented scripting language
Details:
It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2023-28755)
It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possily use this issue to cause a denial of service.
This issue only affected Ubuntu 16.04 ESM. (CVE-2023-28756)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS:
libruby2.7 2.7.0-5ubuntu1.11
ruby2.7 2.7.0-5ubuntu1.11
Ubuntu 18.04 LTS:
libruby2.5 2.5.1-1ubuntu1.16
ruby2.5 2.5.1-1ubuntu1.16
Ubuntu 16.04 LTS (Available with Ubuntu Pro):
libruby2.3 2.3.1-2~ubuntu16.04.16+esm7
ruby2.3 2.3.1-2~ubuntu16.04.16+esm7
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6087-1
CVE-2023-28755, CVE-2023-28756
Package Information:
https://launchpad.net/ubuntu/+source/ruby2.7/2.7.0-5ubuntu1.11
https://launchpad.net/ubuntu/+source/ruby2.5/2.5.1-1ubuntu1.16