UbuntuUpdates.org

Package "ruby2.7-doc"

Name: ruby2.7-doc

Description:

Documentation for Ruby 2.7

Latest version: 2.7.0-5ubuntu1.14
Release: focal (20.04)
Level: updates
Repository: main
Head package: ruby2.7
Homepage: https://www.ruby-lang.org/

Links


Download "ruby2.7-doc"


Other versions of "ruby2.7-doc" in Focal

Repository Area Version
base main 2.7.0-5ubuntu1
security main 2.7.0-5ubuntu1.14

Changelog

Version: 2.7.0-5ubuntu1.9 2023-05-04 11:07:10 UTC

  ruby2.7 (2.7.0-5ubuntu1.9) focal-security; urgency=medium

  * SECURITY UPDATE: ReDoS
    - debian/patches/CVE-2023-28755-*.patch: URI.parse should set empty
      string in host instead of nil in lib/uri/rfc3986_parser.rb, raise
      ArgumentError with empty host url again in
      lib/net/http/generic_request.rb.
    - CVE-2023-28755
  * SECURITY UPDATE: ReDos
    - debian/patches/CVE-2023-28756-*.patch: fix quadratic backtracking on
      invalid time and make RFC2822 regexp linear in lib/time.rb.
    - CVE-2023-28756
  * debian/patches/fix_test_generic.patch: fix test generic.

 -- Leonidas Da Silva Barbosa <email address hidden> Tue, 02 May 2023 05:34:05 -0300

Source diff to previous version
CVE-2023-28755 A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific cha
CVE-2023-28756 A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific ch

Version: 2.7.0-5ubuntu1.8 2023-03-20 21:06:51 UTC

  ruby2.7 (2.7.0-5ubuntu1.8) focal-security; urgency=medium

  * SECURITY UPDATE: HTTP response splitting
    - debian/patches/CVE-2021-33621*.patch: adds regex to lib/cgi/core.rb and
      lib/cgi/cookie.rb along with tests to check http response headers and
      cookie fields for invalid characters.
    - CVE-2021-33621

 -- Leonidas Da Silva Barbosa <email address hidden> Thu, 16 Mar 2023 07:49:39 -0300

Source diff to previous version
CVE-2021-33621 The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that

Version: 2.7.0-5ubuntu1.7 2022-06-06 22:06:18 UTC

  ruby2.7 (2.7.0-5ubuntu1.7) focal-security; urgency=medium

  * SECURITY UPDATE: Buffer over-read
    - debian/patches/CVE-2022-28739.patch: fix dtoa buffer
      overrun in missing/dtoa.c, test/ruby/test_float.rb.
    - CVE-2022-28739

 -- Leonidas Da Silva Barbosa <email address hidden> Mon, 23 May 2022 16:07:39 -0300

Source diff to previous version
CVE-2022-28739 RESERVED

Version: 2.7.0-5ubuntu1.6 2022-01-18 19:07:28 UTC

  ruby2.7 (2.7.0-5ubuntu1.6) focal-security; urgency=medium

  * SECURITY UPDATE: Buffer overrun
    - debian/patches/CVE-2021-41816.patch: fix integer overflow making
      sure use of the check in rb_alloc_tmp_buffer2 in
      ext/cgi/escape/escape.c.
    - CVE-2021-41816
  * SECURITY UPDATE: ReDoS vulnerability
    - debian/patches/CVE-2021-41817-*.patch: add length limit option
      for methods that parses date strings and mimic prev behaviour
      in ext/date/date_core.c, test/date/test_date_parse.rb.
    - CVE-2021-41817
  * SECURITY UPDATE: Mishandles sec prefixes in cookie names
    - debian/patches/CVE-2021-41819.patch: when parsing cookies, only
      decode the values in lib/cgi/cookie.rb, test/cgi/test_cgi_cookie.rb.
    - CVE-2021-41819

 -- Leonidas Da Silva Barbosa <email address hidden> Thu, 06 Jan 2022 09:34:12 -0300

Source diff to previous version
CVE-2021-41816 RESERVED
CVE-2021-41817 RESERVED
CVE-2021-41819 RESERVED

Version: 2.7.0-5ubuntu1.5 2021-07-21 17:06:21 UTC

  ruby2.7 (2.7.0-5ubuntu1.5) focal-security; urgency=medium

  * SECURITY UPDATE: Command injection vulnerability in RDoc
    - debian/patches/CVE-2021-31799.patch: fix replace open for File.open
      in lib/rdoc/rdoc.rb, test/rdoc/test_rdoc_rdoc.rb.
    - CVE-2021-31799
  * SECURITY UPDATE: Information leak
    - debian/patches/CVE-2021-31810.patch: ignore IP address in PASV
      responses by default and add new option use_pasv_ip in lib/net/ftp.rb,
      test/net/ftp/test_ftp.rb.
    - CVE-2021-31810
  * SECURITY UPDATE: Stripping vulnerability
    - debian/patches/CVE-2021-32066.patch: fix raising an exception
      when a unknow response error happens in
      lib/net/imap.rb, test/net/imap/test_imap.rb.
    - CVE-2021-32066

 -- Leonidas Da Silva Barbosa <email address hidden> Thu, 15 Jul 2021 16:18:39 -0300

CVE-2021-31799 A command injection vulnerability in RDoc
CVE-2021-31810 An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick
CVE-2021-32066 A StartTLS stripping vulnerability in Net::IMAP



About   -   Send Feedback to @ubuntu_updates