All Vulnerability Reports

USN-6219-1: Ruby vulnerabilities


Severity

Medium

Vendor

VMware Tanzu

Versions Affected

  • Canonical Ubuntu 18.04
  • Canonical Ubuntu 22.04

Description

It was discovered that Ruby incorrectly handled certain regular expressions. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.10 and Ubuntu 20.04 LTS. (CVE-2023-28755) It was discovered that Ruby incorrectly handled certain regular expressions. An attacker could possibly use this issue to cause a denial of service. This issue exists because of an incomplete fix for CVE-2023-28755. (CVE-2023-36617) Update Instructions: Run `sudo pro fix USN-6219-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libruby2.3 - 2.3.1-2~ubuntu16.04.16+esm8 ruby2.3 - 2.3.1-2~ubuntu16.04.16+esm8 ruby2.3-dev - 2.3.1-2~ubuntu16.04.16+esm8 ruby2.3-doc - 2.3.1-2~ubuntu16.04.16+esm8 ruby2.3-tcltk - 2.3.1-2~ubuntu16.04.16+esm8 Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro

CVEs contained in this USN include: CVE-2023-28755, CVE-2023-36617

Affected VMware Products and Versions

Severity is medium unless otherwise noted.

  • Isolation Segment
    • 2.11.x versions prior to 2.11.38
    • 2.13.x versions prior to 2.13.23
    • 3.0.x versions prior to 3.0.16
    • 4.0.x versions prior to 4.0.8+LTS-T
  • VMware Tanzu Application Service for VMs
    • 2.11.x versions prior to 2.11.44
    • 2.13.x versions prior to 2.13.26
    • 3.0.x versions prior to 3.0.16
    • 4.0.x versions prior to 4.0.8+LTS-T

Mitigation

Users of affected products are strongly encouraged to follow the mitigation below. On the Tanzu Network product page for each release, check the Depends On section and/or Release Notes for this information. Releases that have fixed this issue include:

  • Isolation Segment
    • 2.11.38
    • 2.13.23
    • 3.0.16
    • 4.0.8+LTS-T
  • VMware Tanzu Application Service for VMs
    • 2.11.44
    • 2.13.26
    • 3.0.16
    • 4.0.8+LTS-T

References

History

2023-10-17: Initial vulnerability report published.