USN-5020-1: Ruby vulnerabilities
21 July 2021
Several security issues were fixed in Ruby.
Releases
Packages
- ruby2.3 - Object-oriented scripting language
- ruby2.5 - Object-oriented scripting language
- ruby2.7 - Object-oriented scripting language
Details
It was discovered that Ruby incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2021-31799)
It was discovered that Ruby incorrectly handled certain inputs.
An attacker could possibly use this issue to conduct
port scans and service banner extractions. This issue only affected
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 20.10, and Ubuntu 21.04. (CVE-2021-31810)
It was discovered that Ruby incorrectly handled certain inputs.
An attacker could possibly use this issue to perform
machine-in-the-middle attackers to bypass the TLS protection.
(CVE-2021-32066)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 21.04
Ubuntu 20.10
Ubuntu 20.04
Ubuntu 18.04
Ubuntu 16.04
-
libruby2.3
-
2.3.1-2~ubuntu16.04.16+esm1
Available with Ubuntu Pro
-
ruby2.3
-
2.3.1-2~ubuntu16.04.16+esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.