Bugs fixes in "ruby2.3"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2019-16255 | RESERVED | 2019-11-26 |
CVE | CVE-2019-16254 | RESERVED | 2019-11-26 |
CVE | CVE-2019-16201 | RESERVED | 2019-11-26 |
CVE | CVE-2019-15845 | RESERVED | 2019-11-26 |
Launchpad | 1834072 | Puppet agent using 100% CPU, in sched_yield() loop. Looks like an issue with ruby2.3 which has been fixed but not yet made it into Ubuntu. | 2019-09-02 |
Launchpad | 1834072 | Puppet agent using 100% CPU, in sched_yield() loop. Looks like an issue with ruby2.3 which has been fixed but not yet made it into Ubuntu. | 2019-09-02 |
Launchpad | 1834072 | Puppet agent using 100% CPU, in sched_yield() loop. Looks like an issue with ruby2.3 which has been fixed but not yet made it into Ubuntu. | 2019-07-24 |
Launchpad | 1834072 | Puppet agent using 100% CPU, in sched_yield() loop. Looks like an issue with ruby2.3 which has been fixed but not yet made it into Ubuntu. | 2019-07-24 |
CVE | CVE-2019-8325 | Escape sequence injection vulnerability in errors | 2019-04-11 |
CVE | CVE-2019-8324 | Installing a malicious gem may lead to arbitrary code execution | 2019-04-11 |
CVE | CVE-2019-8323 | Escape sequence injection vulnerability in API response handling | 2019-04-11 |
CVE | CVE-2019-8322 | Escape sequence injection vulnerability in gem owner | 2019-04-11 |
CVE | CVE-2019-8321 | Escape sequence injection vulnerability in verbose | 2019-04-11 |
CVE | CVE-2019-8320 | RESERVED | 2019-04-11 |
CVE | CVE-2019-8325 | Escape sequence injection vulnerability in errors | 2019-04-11 |
CVE | CVE-2019-8324 | Installing a malicious gem may lead to arbitrary code execution | 2019-04-11 |
CVE | CVE-2019-8323 | Escape sequence injection vulnerability in API response handling | 2019-04-11 |
CVE | CVE-2019-8322 | Escape sequence injection vulnerability in gem owner | 2019-04-11 |
CVE | CVE-2019-8321 | Escape sequence injection vulnerability in verbose | 2019-04-11 |
CVE | CVE-2019-8320 | RESERVED | 2019-04-11 |
About
-
Send Feedback to @ubuntu_updates