UbuntuUpdates.org

Package "ruby3.2"

Name: ruby3.2

Description:

Interpreter of object-oriented scripting language Ruby

Latest version: 3.2.3-1ubuntu0.24.04.5
Release: noble (24.04)
Level: updates
Repository: main
Homepage: https://www.ruby-lang.org/

Links


Download "ruby3.2"


Other versions of "ruby3.2" in Noble

Repository Area Version
base main 3.2.3-1build3
security main 3.2.3-1ubuntu0.24.04.5

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 3.2.3-1ubuntu0.24.04.5 2025-04-07 17:07:14 UTC

  ruby3.2 (3.2.3-1ubuntu0.24.04.5) noble-security; urgency=medium

  * SECURITY UPDATE: DoS in REXML via many < in an attribute value
    - debian/patches/CVE-2024-35176-pre2.patch: use string scanner with
      baseparser.
    - debian/patches/CVE-2024-35176-pre3.patch: use @scanner << readline
      instead of @scanner.string = @scanner.rest + readline.
    - debian/patches/CVE-2024-35176-pre4.patch: use more StringScanner
      based API to parse XML.
    - debian/patches/CVE-2024-35176-pre5.patch: optimize the
      parse_attributes method to use Source#match to parse XML.
    - debian/patches/CVE-2024-35176-1.patch: read quoted attributes in
      chunks.
    - debian/patches/CVE-2024-35176-2.patch: add support for old strscan.
    - CVE-2024-35176
  * SECURITY UPDATE: DoS in REXML via many specific characters
    - debian/patches/CVE-2024-39908-pre1.patch: remove Source#string=
      method.
    - debian/patches/CVE-2024-39908-pre2.patch: add a "malformed comment"
      check for top-level comments.
    - debian/patches/CVE-2024-39908-1.patch: fix performance issue caused
      by using repeated > characters.
    - debian/patches/CVE-2024-39908-2.patch: fix ReDoS caused by very large
      character references using repeated 0s.
    - debian/patches/CVE-2024-39908-3.patch: fix performance issue caused
      by using repeated > characters inside comments.
    - debian/patches/CVE-2024-39908-4.patch: fix performance issue caused
      by using repeated > characters inside CDATA [ PAYLOAD ].
    - debian/patches/CVE-2024-39908-5.patch: fix performance issue caused
      by using repeated > characters after <!DOCTYPE name.
    - debian/patches/CVE-2024-39908-6.patch: fix performance issue caused
      by using repeated > characters inside <!DOCTYPE root [<!-- PAYLOAD
      -->]>.
    - debian/patches/CVE-2024-39908-7.patch: fix performance issue caused
      by using repeated > characters inside <!DOCTYPE name [<!ENTITY>]>.
    - debian/patches/CVE-2024-39908-8.patch: fix ReDoS by using repeated
      space characters inside <!DOCTYPE name [<!ATTLIST>]>.
    - debian/patches/CVE-2024-39908-9.patch: fix performance issue caused
      by using repeated > characters inside <xml><!-- --></xml>.
    - CVE-2024-39908
  * SECURITY UPDATE: DoS in REXML via many specific characters
    - debian/patches/CVE-2024-41123-pre1.patch: fix method scope in test in
      order to invoke the tests properly and fix exception message.
    - debian/patches/CVE-2024-41123-pre2.patch: add missing encode for
      custom term.
    - debian/patches/CVE-2024-41123-pre3.patch: add position check for XML
      declaration.
    - debian/patches/CVE-2024-41123-1.patch: fix source.match performance
      without specifying term string.
    - debian/patches/CVE-2024-41123-2.patch: parse pi: improve invalid case
      detection.
    - CVE-2024-41123
  * SECURITY UPDATE: DoS in REXML via many deep elements
    - debian/patches/CVE-2024-43398-pre1.patch: keep the current namespaces
      instead of stack of Set.
    - debian/patches/CVE-2024-43398-1.patch: improve namespace conflicted
      attribute check performance.
    - debian/patches/CVE-2024-43398-2.patch: fix handling with "xml:"
      prefixed namespace.
    - CVE-2024-43398
  * SECURITY UPDATE: DoS in net-imap response parser
    - debian/patches/CVE-2025-25186.patch: limit number of UIDs in
      .bundle/gems/net-imap-0.4.9.1/lib/net/imap/response_parser.rb.
    - CVE-2025-25186
  * SECURITY UPDATE: DoS in CGI Gem
    - debian/patches/CVE-2025-27219.patch: use String#concat instead of
      String#+ for reducing cpu usage in lib/cgi/cookie.rb.
    - CVE-2025-27219
  * SECURITY UPDATE: ReDoS in CGI Gem
    - debian/patches/CVE-2025-27220.patch: escape/unescape unclosed tags as
      well in lib/cgi/util.rb, test/cgi/test_cgi_util.rb.
    - CVE-2025-27220
  * SECURITY UPDATE: credential leak in URI gem
    - debian/patches/CVE-2025-27221-1.patch: truncate userinfo in
      lib/uri/generic.rb, test/uri/test_generic.rb.
    - debian/patches/CVE-2025-27221-2.patch: fix merger of URI with
      authority component in lib/uri/generic.rb, test/uri/test_generic.rb.
    - CVE-2025-27221

 -- Marc Deslauriers <email address hidden> Mon, 10 Mar 2025 14:14:00 -0400

Source diff to previous version
CVE-2024-35176 REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an att
CVE-2024-39908 REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters suc
CVE-2024-41123 REXML is an XML toolkit for Ruby. The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters suc
CVE-2024-43398 REXML is an XML toolkit for Ruby. The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same
CVE-2025-25186 Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4
CVE-2025-27219 In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI library contains a potential Denial of Service (DoS) vulnerability. The
CVE-2025-27220 In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method.
CVE-2025-27221 In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.join, URI#merge, URI#+) have an inadvertent leakage of authentication credentials

Version: 3.2.3-1ubuntu0.24.04.3 2024-11-05 07:06:56 UTC

  ruby3.2 (3.2.3-1ubuntu0.24.04.3) noble-security; urgency=medium

  * SECURITY UPDATE: denial of service in REXML
    - debian/patches/CVE-2024-35176_39908_41123.patch: Read quoted
      attributes in chunks
    - debian/patches/CVE-2024-41946.patch: Add support for XML entity
      expansion limitation in SAX and pull parsers
    - debian/patches/CVE-2024-49761.patch: fix a bug that &#0x...; is
      accepted as a character reference
    - CVE-2024-35176
    - CVE-2024-39908
    - CVE-2024-41123
    - CVE-2024-41946
    - CVE-2024-49761

 -- Nishit Majithia <email address hidden> Fri, 25 Oct 2024 14:06:35 +0530

Source diff to previous version
CVE-2024-35176 REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an att
CVE-2024-41946 REXML is an XML toolkit for Ruby. The REXML gem 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull
CVE-2024-49761 REXML is an XML toolkit for Ruby. The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between &# and x...
CVE-2024-39908 REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters suc
CVE-2024-41123 REXML is an XML toolkit for Ruby. The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters suc

Version: 3.2.3-1ubuntu0.24.04.1 2024-06-17 16:07:34 UTC

  ruby3.2 (3.2.3-1ubuntu0.24.04.1) noble-security; urgency=medium

  * SECURITY UPDATE: code execution in RDoc
    - debian/patches/CVE-2024-27281-1.patch: filter marshalled objects in
      lib/rdoc/store.rb.
    - debian/patches/CVE-2024-27281-2.patch: fix NoMethodError for
      start_with in lib/rdoc/store.rb.
    - CVE-2024-27281
  * SECURITY UPDATE: heap data extraction via regex
    - debian/patches/CVE-2024-27282.patch: fix Use-After-Free issue for
      Regexp in regexec.c.
    - CVE-2024-27282

 -- Marc Deslauriers <email address hidden> Fri, 14 Jun 2024 07:50:43 -0400

CVE-2024-27281 An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x through 3.3.0. When parsing .rdoc_options (used for configuration in
CVE-2024-27282 An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitr



About   -   Send Feedback to @ubuntu_updates