Package "libruby3.0"
Name: |
libruby3.0
|
Description: |
Libraries necessary to run Ruby 3.0
|
Latest version: |
3.0.2-7ubuntu2.10 |
Release: |
jammy (22.04) |
Level: |
security |
Repository: |
main |
Head package: |
ruby3.0 |
Homepage: |
https://www.ruby-lang.org/ |
Links
Download "libruby3.0"
Other versions of "libruby3.0" in Jammy
Changelog
ruby3.0 (3.0.2-7ubuntu2.10) jammy-security; urgency=medium
* SECURITY UPDATE: DoS in REXML via many < in an attribute value
- debian/patches/CVE-2024-35176-pre2.patch: use string scanner with
baseparser.
- debian/patches/CVE-2024-35176-pre3.patch: use @scanner << readline
instead of @scanner.string = @scanner.rest + readline.
- debian/patches/CVE-2024-35176-pre4.patch: use more StringScanner
based API to parse XML.
- debian/patches/CVE-2024-35176-pre5.patch: optimize the
parse_attributes method to use Source#match to parse XML.
- debian/patches/CVE-2024-35176-1.patch: read quoted attributes in
chunks.
- debian/patches/CVE-2024-35176-2.patch: add support for old strscan.
- CVE-2024-35176
* SECURITY UPDATE: DoS in REXML via many specific characters
- debian/patches/CVE-2024-39908-pre1.patch: remove Source#string=
method.
- debian/patches/CVE-2024-39908-pre2.patch: add a "malformed comment"
check for top-level comments.
- debian/patches/CVE-2024-39908-1.patch: fix performance issue caused
by using repeated > characters.
- debian/patches/CVE-2024-39908-2.patch: fix ReDoS caused by very large
character references using repeated 0s.
- debian/patches/CVE-2024-39908-3.patch: fix performance issue caused
by using repeated > characters inside comments.
- debian/patches/CVE-2024-39908-4.patch: fix performance issue caused
by using repeated > characters inside CDATA [ PAYLOAD ].
- debian/patches/CVE-2024-39908-5.patch: fix performance issue caused
by using repeated > characters after <!DOCTYPE name.
- debian/patches/CVE-2024-39908-6.patch: fix performance issue caused
by using repeated > characters inside <!DOCTYPE root [<!-- PAYLOAD
-->]>.
- debian/patches/CVE-2024-39908-7.patch: fix performance issue caused
by using repeated > characters inside <!DOCTYPE name [<!ENTITY>]>.
- debian/patches/CVE-2024-39908-8.patch: fix ReDoS by using repeated
space characters inside <!DOCTYPE name [<!ATTLIST>]>.
- debian/patches/CVE-2024-39908-9.patch: fix performance issue caused
by using repeated > characters inside <xml><!-- --></xml>.
- CVE-2024-39908
* SECURITY UPDATE: DoS in REXML via many specific characters
- debian/patches/CVE-2024-41123-pre1.patch: fix method scope in test in
order to invoke the tests properly and fix exception message.
- debian/patches/CVE-2024-41123-pre2.patch: add missing encode for
custom term.
- debian/patches/CVE-2024-41123-pre3.patch: add position check for XML
declaration.
- debian/patches/CVE-2024-41123-1.patch: fix source.match performance
without specifying term string.
- debian/patches/CVE-2024-41123-2.patch: parse pi: improve invalid case
detection.
- CVE-2024-41123
* SECURITY UPDATE: DoS in REXML via many deep elements
- debian/patches/CVE-2024-43398-pre1.patch: keep the current namespaces
instead of stack of Set.
- debian/patches/CVE-2024-43398-1.patch: improve namespace conflicted
attribute check performance.
- debian/patches/CVE-2024-43398-2.patch: fix handling with "xml:"
prefixed namespace.
- CVE-2024-43398
* SECURITY UPDATE: DoS in CGI Gem
- debian/patches/CVE-2025-27219.patch: use String#concat instead of
String#+ for reducing cpu usage in lib/cgi/cookie.rb.
- CVE-2025-27219
* SECURITY UPDATE: ReDoS in CGI Gem
- debian/patches/CVE-2025-27220.patch: escape/unescape unclosed tags as
well in lib/cgi/util.rb, test/cgi/test_cgi_util.rb.
- CVE-2025-27220
* SECURITY UPDATE: credential leak in URI gem
- debian/patches/CVE-2025-27221-1.patch: truncate userinfo in
lib/uri/generic.rb, test/uri/test_generic.rb.
- debian/patches/CVE-2025-27221-2.patch: fix merger of URI with
authority component in lib/uri/generic.rb, test/uri/test_generic.rb.
- CVE-2025-27221
-- Marc Deslauriers <email address hidden> Mon, 10 Mar 2025 14:14:00 -0400
|
Source diff to previous version |
CVE-2024-35176 |
REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an att |
CVE-2024-39908 |
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters suc |
CVE-2024-41123 |
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters suc |
CVE-2024-43398 |
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same |
CVE-2025-27219 |
In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI library contains a potential Denial of Service (DoS) vulnerability. The |
CVE-2025-27220 |
In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method. |
CVE-2025-27221 |
In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.join, URI#merge, URI#+) have an inadvertent leakage of authentication credentials |
|
ruby3.0 (3.0.2-7ubuntu2.8) jammy-security; urgency=medium
* SECURITY UPDATE: denial or service in REXML
- debian/patches/CVE-2024-35176_39908_41123.patch: Read quoted
attributes in chunks
- debian/patches/CVE-2024-41946.patch: Add support for XML entity
expansion limitation in SAX and pull parsers
- debian/patches/CVE-2024-49761.patch: fix a bug that �x...; is
accepted as a character reference
- CVE-2024-35176
- CVE-2024-39908
- CVE-2024-41123
- CVE-2024-41946
- CVE-2024-49761
-- Nishit Majithia <email address hidden> Fri, 25 Oct 2024 11:13:21 +0530
|
Source diff to previous version |
CVE-2024-35176 |
REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an att |
CVE-2024-41946 |
REXML is an XML toolkit for Ruby. The REXML gem 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull |
CVE-2024-49761 |
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between &# and x... |
CVE-2024-39908 |
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters suc |
CVE-2024-41123 |
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters suc |
|
ruby3.0 (3.0.2-7ubuntu2.7) jammy-security; urgency=medium
* SECURITY UPDATE: buffer over-read in StringIO
- debian/patches/CVE-2024-27280.patch: fix expanding size at
ungetc/ungetbyte in ext/stringio/stringio.c,
test/stringio/test_stringio.rb.
- CVE-2024-27280
-- Marc Deslauriers <email address hidden> Wed, 19 Jun 2024 10:32:00 -0400
|
Source diff to previous version |
CVE-2024-27280 |
A buffer-overread issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4. The ungetbyte and unget |
|
ruby3.0 (3.0.2-7ubuntu2.6) jammy-security; urgency=medium
* SECURITY UPDATE: code execution in RDoc
- debian/patches/CVE-2024-27281-1.patch: filter marshalled objects in
lib/rdoc/store.rb.
- debian/patches/CVE-2024-27281-2.patch: use safe_load and
safe_load_file for .rdoc_options in lib/rdoc/rdoc.rb,
test/rdoc/test_rdoc_options.rb.
- debian/patches/CVE-2024-27281-3.patch: fix NoMethodError for
start_with in lib/rdoc/store.rb.
- CVE-2024-27281
* SECURITY UPDATE: heap data extraction via regex
- debian/patches/CVE-2024-27282.patch: fix Use-After-Free issue for
Regexp in regexec.c.
- CVE-2024-27282
-- Marc Deslauriers <email address hidden> Fri, 14 Jun 2024 08:02:18 -0400
|
Source diff to previous version |
CVE-2024-27281 |
An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x through 3.3.0. When parsing .rdoc_options (used for configuration in |
CVE-2024-27282 |
An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitr |
|
ruby3.0 (3.0.2-7ubuntu2.4) jammy-security; urgency=medium
* SECURITY UPDATE: ReDoS
- debian/patches/CVE-2023-28755.patch: adds '+' once or more in specific
places of the RFC3986 regex in order to avoid the increase in execution
time for parsing strings to URI objects in lib/uri/rfc3986_parser.rb.
- debian/patches/CVE-2023-28755-fix-test-uri-empty-host-again.patch:
fix test uri in lib/net/http/generic_request.rb.
- CVE-2023-28755
* SECURITY UPDATE: ReDoS
- debian/patches/CVE-2023-36617.patch: changes regex behaviour
in lib/url/rfc2396_parser.rb, lib/uri/rfc3986_parser.rb.
- CVE-2023-36617
-- Leonidas Da Silva Barbosa <email address hidden> Fri, 07 Jul 2023 11:37:56 -0300
|
CVE-2023-28755 |
A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific cha |
CVE-2023-36617 |
A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There |
|
About
-
Send Feedback to @ubuntu_updates