exploit the possibilities

Ubuntu Security Notice USN-5020-1

Ubuntu Security Notice USN-5020-1
Posted Jul 21, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 5020-1 - It was discovered that Ruby incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code. It was discovered that Ruby incorrectly handled certain inputs. An attacker could possibly use this issue to conduct port scans and service banner extractions. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 20.10, and Ubuntu 21.04. Various other issues were also addressed.

tags | advisory, arbitrary, ruby
systems | linux, ubuntu
advisories | CVE-2021-31799, CVE-2021-31810, CVE-2021-32066
MD5 | b2e949441f11b0559bbbb899cab3d9d3

Ubuntu Security Notice USN-5020-1

Change Mirror Download
=========================================================================
Ubuntu Security Notice USN-5020-1
July 21, 2021

ruby2.3, ruby2.5, ruby2.7 vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 21.04
- Ubuntu 20.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM

Summary:

Several security issues were fixed in Ruby.

Software Description:
- ruby2.7: Object-oriented scripting language
- ruby2.5: Object-oriented scripting language
- ruby2.3: Object-oriented scripting language

Details:

It was discovered that Ruby incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2021-31799)

It was discovered that Ruby incorrectly handled certain inputs.
An attacker could possibly use this issue to conduct
port scans and service banner extractions. This issue only affected
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 20.10, and Ubuntu 21.04. (CVE-2021-31810)

It was discovered that Ruby incorrectly handled certain inputs.
An attacker could possibly use this issue to perform
man-in-the-middle attackers to bypass the TLS protection.
(CVE-2021-32066)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 21.04:
libruby2.7 2.7.2-4ubuntu1.2
ruby2.7 2.7.2-4ubuntu1.2

Ubuntu 20.10:
libruby2.7 2.7.1-3ubuntu1.4
ruby2.7 2.7.1-3ubuntu1.4

Ubuntu 20.04 LTS:
libruby2.7 2.7.0-5ubuntu1.5
ruby2.7 2.7.0-5ubuntu1.5

Ubuntu 18.04 LTS:
libruby2.5 2.5.1-1ubuntu1.10
ruby2.5 2.5.1-1ubuntu1.10

Ubuntu 16.04 ESM:
libruby2.3 2.3.1-2~ubuntu16.04.16+esm1
ruby2.3 2.3.1-2~ubuntu16.04.16+esm1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-5020-1
CVE-2021-31799, CVE-2021-31810, CVE-2021-32066

Package Information:
https://launchpad.net/ubuntu/+source/ruby2.7/2.7.2-4ubuntu1.2
https://launchpad.net/ubuntu/+source/ruby2.7/2.7.1-3ubuntu1.4
https://launchpad.net/ubuntu/+source/ruby2.7/2.7.0-5ubuntu1.5
https://launchpad.net/ubuntu/+source/ruby2.5/2.5.1-1ubuntu1.10
Login or Register to add favorites

File Archive:

July 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    13 Files
  • 2
    Jul 2nd
    12 Files
  • 3
    Jul 3rd
    1 Files
  • 4
    Jul 4th
    2 Files
  • 5
    Jul 5th
    34 Files
  • 6
    Jul 6th
    21 Files
  • 7
    Jul 7th
    21 Files
  • 8
    Jul 8th
    13 Files
  • 9
    Jul 9th
    6 Files
  • 10
    Jul 10th
    1 Files
  • 11
    Jul 11th
    3 Files
  • 12
    Jul 12th
    15 Files
  • 13
    Jul 13th
    19 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    15 Files
  • 16
    Jul 16th
    9 Files
  • 17
    Jul 17th
    2 Files
  • 18
    Jul 18th
    2 Files
  • 19
    Jul 19th
    19 Files
  • 20
    Jul 20th
    21 Files
  • 21
    Jul 21st
    53 Files
  • 22
    Jul 22nd
    14 Files
  • 23
    Jul 23rd
    14 Files
  • 24
    Jul 24th
    1 Files
  • 25
    Jul 25th
    1 Files
  • 26
    Jul 26th
    21 Files
  • 27
    Jul 27th
    8 Files
  • 28
    Jul 28th
    9 Files
  • 29
    Jul 29th
    12 Files
  • 30
    Jul 30th
    9 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close