UbuntuUpdates.org

Package "ruby3.0"

Name: ruby3.0

Description:

Interpreter of object-oriented scripting language Ruby

Latest version: 3.0.2-7ubuntu2.7
Release: jammy (22.04)
Level: updates
Repository: main
Homepage: https://www.ruby-lang.org/

Links


Download "ruby3.0"


Other versions of "ruby3.0" in Jammy

Repository Area Version
security main 3.0.2-7ubuntu2.7

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 3.0.2-7ubuntu2.7 2024-06-26 17:07:22 UTC

  ruby3.0 (3.0.2-7ubuntu2.7) jammy-security; urgency=medium

  * SECURITY UPDATE: buffer over-read in StringIO
    - debian/patches/CVE-2024-27280.patch: fix expanding size at
      ungetc/ungetbyte in ext/stringio/stringio.c,
      test/stringio/test_stringio.rb.
    - CVE-2024-27280

 -- Marc Deslauriers <email address hidden> Wed, 19 Jun 2024 10:32:00 -0400

Source diff to previous version
CVE-2024-27280 A buffer-overread issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4. The ungetbyte and unget

Version: 3.0.2-7ubuntu2.6 2024-06-17 16:07:27 UTC

  ruby3.0 (3.0.2-7ubuntu2.6) jammy-security; urgency=medium

  * SECURITY UPDATE: code execution in RDoc
    - debian/patches/CVE-2024-27281-1.patch: filter marshalled objects in
      lib/rdoc/store.rb.
    - debian/patches/CVE-2024-27281-2.patch: use safe_load and
      safe_load_file for .rdoc_options in lib/rdoc/rdoc.rb,
      test/rdoc/test_rdoc_options.rb.
    - debian/patches/CVE-2024-27281-3.patch: fix NoMethodError for
      start_with in lib/rdoc/store.rb.
    - CVE-2024-27281
  * SECURITY UPDATE: heap data extraction via regex
    - debian/patches/CVE-2024-27282.patch: fix Use-After-Free issue for
      Regexp in regexec.c.
    - CVE-2024-27282

 -- Marc Deslauriers <email address hidden> Fri, 14 Jun 2024 08:02:18 -0400

Source diff to previous version
CVE-2024-27281 An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x through 3.3.0. When parsing .rdoc_options (used for configuration in
CVE-2024-27282 An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitr

Version: 3.0.2-7ubuntu2.5 2024-04-25 19:08:34 UTC

  ruby3.0 (3.0.2-7ubuntu2.5) jammy; urgency=medium

  * d/p/fix-ruby_xfree-segfault.patch: fix occasional segfault (LP: #2049197).
  * Replace expired certificate in tests with upstream patch (LP: #2051380).
    - d/p/renew-test-certificates-d3933fc753187a055a4904af82f5f3794c88c416.patch

 -- Lucas Kanashiro <email address hidden> Wed, 20 Mar 2024 17:50:02 -0300

Source diff to previous version
2051380 Expired certificate used for tests causes failures

Version: 3.0.2-7ubuntu2.4 2023-07-12 18:07:05 UTC

  ruby3.0 (3.0.2-7ubuntu2.4) jammy-security; urgency=medium

  * SECURITY UPDATE: ReDoS
    - debian/patches/CVE-2023-28755.patch: adds '+' once or more in specific
      places of the RFC3986 regex in order to avoid the increase in execution
      time for parsing strings to URI objects in lib/uri/rfc3986_parser.rb.
    - debian/patches/CVE-2023-28755-fix-test-uri-empty-host-again.patch:
      fix test uri in lib/net/http/generic_request.rb.
    - CVE-2023-28755
  * SECURITY UPDATE: ReDoS
    - debian/patches/CVE-2023-36617.patch: changes regex behaviour
      in lib/url/rfc2396_parser.rb, lib/uri/rfc3986_parser.rb.
    - CVE-2023-36617

 -- Leonidas Da Silva Barbosa <email address hidden> Fri, 07 Jul 2023 11:37:56 -0300

Source diff to previous version
CVE-2023-28755 A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific cha
CVE-2023-36617 A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There

Version: 3.0.2-7ubuntu2.3 2023-01-23 18:07:32 UTC

  ruby3.0 (3.0.2-7ubuntu2.3) jammy-security; urgency=medium

  * SECURITY UPDATE: HTTP response splitting
    - debian/patches/CVE-2021-33621*.patch: adds regex to lib/cgi/core.rb and
      lib/cgi/cookie.rb along with tests to check http response headers and
      cookie fields for invalid characters.
    - debian/patches/fix_tzdata-2022.patch: fix for tzdata-2022g tests
      in test/ruby/test_time_tz.rb.
    - CVE-2021-33621

 -- Leonidas Da Silva Barbosa <email address hidden> Wed, 18 Jan 2023 14:28:21 -0300

CVE-2021-33621 The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that



About   -   Send Feedback to @ubuntu_updates