UbuntuUpdates.org

Package "libruby2.5"

Name: libruby2.5

Description:

Libraries necessary to run Ruby 2.5

Latest version: 2.5.1-1ubuntu1.10
Release: bionic (18.04)
Level: updates
Repository: main
Head package: ruby2.5
Homepage: http://www.ruby-lang.org/

Links


Download "libruby2.5"


Other versions of "libruby2.5" in Bionic

Repository Area Version
base main 2.5.1-1ubuntu1
security main 2.5.1-1ubuntu1.10
PPA: Brightbox Ruby NG Experimental 2.5.8-1bbox1~bionic1

Changelog

Version: 2.5.1-1ubuntu1.10 2021-07-21 17:06:19 UTC

  ruby2.5 (2.5.1-1ubuntu1.10) bionic-security; urgency=medium

  * SECURITY UPDATE: Command injection vulnerability in RDoc
    - debian/patches/CVE-2021-31799.patch: fix replace open for File.open
      in lib/rdoc/rdoc.rb, test/rdoc/test_rdoc_rdoc.rb.
    - CVE-2021-31799
  * SECURITY UPDATE: Information leak
    - debian/patches/CVE-2021-31810.patch: ignore IP address in PASV
      responses by default and add new option use_pasv_ip in lib/net/ftp.rb,
      test/net/ftp/test_ftp.rb.
    - CVE-2021-31810
  * SECURITY UPDATE: Stripping vulnerability
    - debian/patches/CVE-2021-32066.patch: fix raising an exception
      when a unknow response error happens in
      lib/net/imap.rb, test/net/imap/test_imap.rb.
    - CVE-2021-32066
  * debian/patches/fixing_test_imap.patch: adds start_server to
    IMAPTest in order to test_starttls_stripping runs properly.

 -- Leonidas Da Silva Barbosa <email address hidden> Thu, 15 Jul 2021 14:22:59 -0300

Source diff to previous version
CVE-2021-31799 A command injection vulnerability in RDoc
CVE-2021-31810 An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick
CVE-2021-32066 A StartTLS stripping vulnerability in Net::IMAP

Version: 2.5.1-1ubuntu1.9 2021-04-20 20:06:25 UTC

  ruby2.5 (2.5.1-1ubuntu1.9) bionic-security; urgency=medium

  * SECURITY UPDATE: XML round-trip vulnerability in REXML
    - debian/patches/CVE-2021-28965.patch: update to REXML 3.1.7.4.
    - CVE-2021-28965

 -- Marc Deslauriers <email address hidden> Thu, 15 Apr 2021 10:09:08 -0400

Source diff to previous version

Version: 2.5.1-1ubuntu1.8 2021-03-18 20:07:10 UTC

  ruby2.5 (2.5.1-1ubuntu1.8) bionic-security; urgency=medium

  * SECURITY UPDATE: Unsafe Object Creation Vulnerability in JSON gem
    - debian/patches/CVE-2020-10663.patch: set json->create_additions to 0
      in ext/json/parser/parser.c, ext/json/parser/parser.rl.
    - CVE-2020-10663
  * SECURITY UPDATE: sensitive info disclosure in BasicSocket#read_nonblock
    - debian/patches/CVE-2020-10933.patch: do not return uninitialized
      buffer in ext/socket/init.c.
    - CVE-2020-10933
  * SECURITY UPDATE: HTTP Request Smuggling attack in WEBrick
    - debian/patches/CVE-2020-25613.patch: make it more strict to interpret
      some headers in lib/webrick/httprequest.rb.
    - CVE-2020-25613

 -- Marc Deslauriers <email address hidden> Tue, 16 Mar 2021 10:59:21 -0400

Source diff to previous version
CVE-2020-10663 The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulne
CVE-2020-10933 An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buff
CVE-2020-25613 An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not

Version: 2.5.1-1ubuntu1.7 2020-12-02 02:06:19 UTC

  ruby2.5 (2.5.1-1ubuntu1.7) bionic; urgency=medium

  * d/p/arm64-optimizations.patch: enable arm64 optimizations that exist
    for power/x86. It includes enabling unaligned memory access, gc and
    vm_exec.c optimizations (LP: #1901074).
  * Fix FTBFS, many tests were failing during the build (LP: #1903902).
    - Add missing b-d on tzdata.
  * Fix DEP-8 tests (LP: #1903905).
    - Backport patches to fix Kiritimati TZ tests:
      + 0029-Backport-upstream-patch-to-fix-Kiritimati-TZ-test-1-.patch
      + 0030-Backport-upstream-patch-to-fix-Kiritimati-TZ-test-2-.patch
    - d/t/control: add restriction to allow-stderr. The rubyconfig test calls
      dpkg-architecture which is returning a warning in Bionic.
    - d/t/bundled-gems: skip gems which do not match upstream expectations.
      Some gems listed as bundled by upstream are not satisfied by the Ubuntu
      Bionic archive.

 -- Lucas Kanashiro <email address hidden> Thu, 05 Nov 2020 10:30:22 -0300

Source diff to previous version
1901074 [SRU] Enable some arm64 performance optimizations already available for other architectures
1903902 [SRU] ruby2.5 FTBFS in Bionic
1903905 [SRU] ruby2.5 DEP-8 tests are failing in Bionic

Version: 2.5.1-1ubuntu1.6 2019-11-26 17:06:38 UTC

  ruby2.5 (2.5.1-1ubuntu1.6) bionic-security; urgency=medium

  * SECURITY UPDATE: NULL injection vulnerability
    - debian/patches/CVE-2019-15845.patch: ensure that
      pattern does not contain a NULL character in dir.c,
      test/ruby/test_fnmatch.rb.
    - CVE-2019-15845
  * SECURITY UPDATE: Denial of service vulnerability
    - debian/patches/CVE-2019-16201.patch: fix in
      lib/webrick/httpauth/digestauth.rb,
      test/webrick/test_httpauth.rb.
    - CVE-2019-16201.patch
  * SECURITY UPDATE: HTTP response splitting in WEBrick
    - debian/patches/CVE-2019-16254.patch: prevent response
      splitting and header injection in lib/webrick/httpresponse.rb,
      test/webrick/test_httpresponse.rb.
    - CVE-2019-16254
  * SECURITY UPDATE: Code injection
    - debian/patches/CVE-2019-16255.patch: prevent unknown command
      in lib/shell/command-processor.rb, test/shell/test_command_processor.rb.
    - CVE-2019-16255

 -- <email address hidden> (Leonidas S. Barbosa) Tue, 26 Nov 2019 09:32:04 -0300

CVE-2019-15845 RESERVED
CVE-2019-16201 RESERVED
CVE-2019-16254 RESERVED
CVE-2019-16255 RESERVED



About   -   Send Feedback to @ubuntu_updates