[ubuntu/bionic-security] ruby2.5 2.5.1-1ubuntu1.6 (Accepted)
Leonidas S. Barbosa
leo.barbosa at canonical.com
Tue Nov 26 14:51:29 UTC 2019
ruby2.5 (2.5.1-1ubuntu1.6) bionic-security; urgency=medium
* SECURITY UPDATE: NULL injection vulnerability
- debian/patches/CVE-2019-15845.patch: ensure that
pattern does not contain a NULL character in dir.c,
test/ruby/test_fnmatch.rb.
- CVE-2019-15845
* SECURITY UPDATE: Denial of service vulnerability
- debian/patches/CVE-2019-16201.patch: fix in
lib/webrick/httpauth/digestauth.rb,
test/webrick/test_httpauth.rb.
- CVE-2019-16201.patch
* SECURITY UPDATE: HTTP response splitting in WEBrick
- debian/patches/CVE-2019-16254.patch: prevent response
splitting and header injection in lib/webrick/httpresponse.rb,
test/webrick/test_httpresponse.rb.
- CVE-2019-16254
* SECURITY UPDATE: Code injection
- debian/patches/CVE-2019-16255.patch: prevent unknown command
in lib/shell/command-processor.rb, test/shell/test_command_processor.rb.
- CVE-2019-16255
Date: 2019-11-26 12:44:14.628115+00:00
Changed-By: leo.barbosa at canonical.com (Leonidas S. Barbosa)
https://launchpad.net/ubuntu/+source/ruby2.5/2.5.1-1ubuntu1.6
-------------- next part --------------
Sorry, changesfile not available.
More information about the Bionic-changes
mailing list