First published: Mon Nov 05 2018(Updated: )
It was discovered that Ruby incorrectly handled certain X.509 certificates. An attacker could possibly use this issue to bypass the certificate check. (CVE-2018-16395) It was discovered that Ruby incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code. (CVE-2018-16396)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libruby2.5 | <2.5.1-5ubuntu4.1 | 2.5.1-5ubuntu4.1 |
=18.10 | ||
All of | ||
ubuntu/ruby2.5 | <2.5.1-5ubuntu4.1 | 2.5.1-5ubuntu4.1 |
=18.10 | ||
All of | ||
ubuntu/libruby2.5 | <2.5.1-1ubuntu1.1 | 2.5.1-1ubuntu1.1 |
=18.04 | ||
All of | ||
ubuntu/ruby2.5 | <2.5.1-1ubuntu1.1 | 2.5.1-1ubuntu1.1 |
=18.04 | ||
All of | ||
ubuntu/libruby2.3 | <2.3.1-2~16.04.11 | 2.3.1-2~16.04.11 |
=16.04 | ||
All of | ||
ubuntu/ruby2.3 | <2.3.1-2~16.04.11 | 2.3.1-2~16.04.11 |
=16.04 | ||
All of | ||
ubuntu/libruby1.9.1 | <1.9.3.484-2ubuntu1.13 | 1.9.3.484-2ubuntu1.13 |
=14.04 | ||
All of | ||
ubuntu/libruby2.0 | <2.0.0.484-1ubuntu2.11 | 2.0.0.484-1ubuntu2.11 |
=14.04 | ||
All of | ||
ubuntu/ruby1.9.1 | <1.9.3.484-2ubuntu1.13 | 1.9.3.484-2ubuntu1.13 |
=14.04 | ||
All of | ||
ubuntu/ruby1.9.3 | <1.9.3.484-2ubuntu1.13 | 1.9.3.484-2ubuntu1.13 |
=14.04 | ||
All of | ||
ubuntu/ruby2.0 | <2.0.0.484-1ubuntu2.11 | 2.0.0.484-1ubuntu2.11 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this advisory is USN-3808-1.
The severity of USN-3808-1 is not specified in the information provided.
Ruby incorrectly handles certain X.509 certificates.
An attacker could possibly bypass the certificate check.
Ruby incorrectly handles certain inputs.
An attacker could possibly execute arbitrary code.
Check if you are using the affected versions of libruby2.5, ruby2.5, libruby2.3, ruby2.3, libruby1.9.1, libruby2.0, ruby1.9.1, ruby1.9.3, or ruby2.0 on Ubuntu.
Update to version 2.5.1-5ubuntu4.1 of libruby2.5 and ruby2.5, or version 2.3.1-2~16.04.11 of libruby2.3 and ruby2.3, or version 1.9.3.484-2ubuntu1.13 of libruby1.9.1, ruby1.9.1, ruby1.9.3, or ruby2.0, depending on the Ubuntu version you are using.
You can find more information about this vulnerability in the provided references.