Search for packages
Package details: pkg:deb/ubuntu/ruby2.7@2.7.0-4ubuntu1
purl pkg:deb/ubuntu/ruby2.7@2.7.0-4ubuntu1
Next non-vulnerable version 2.7.0-5ubuntu1.5
Latest non-vulnerable version 2.7.0-5ubuntu1.5
Risk 4.5
Vulnerabilities affecting this package (7)
Vulnerability Summary Fixed by
VCID-4qeb-7mva-aaak
Aliases:
CVE-2021-32066
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
2.7.0-5ubuntu1.5
Affected by 0 other vulnerabilities.
VCID-gmf4-gcd5-aaab
Aliases:
CVE-2021-31799
GHSA-ggxm-pgc9-g7fp
In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.
2.7.0-5ubuntu1.5
Affected by 0 other vulnerabilities.
VCID-nw56-rqyq-aaaq
Aliases:
CVE-2021-28965
GHSA-8cr8-4vfw-mr7h
The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing.
2.7.0-5ubuntu1.4
Affected by 3 other vulnerabilities.
VCID-rzw4-4w1h-aaaj
Aliases:
CVE-2020-10933
An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer, exception: false), the method resizes the buffer to fit the requested size, but no data is copied. Thus, the buffer string provides the previous value of the heap. This may expose possibly sensitive data from the interpreter.
2.7.0-5ubuntu1.3
Affected by 4 other vulnerabilities.
VCID-sth6-4edt-aaar
Aliases:
CVE-2020-25613
GHSA-gwfg-cqmg-cf8f
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
2.7.0-5ubuntu1.3
Affected by 4 other vulnerabilities.
VCID-t5p8-75v9-aaap
Aliases:
CVE-2020-10663
GHSA-jphg-qwrw-7w9g
The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent.
2.7.0-5ubuntu1.2
Affected by 6 other vulnerabilities.
VCID-xv5b-y3av-aaae
Aliases:
CVE-2021-31810
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).
2.7.0-5ubuntu1.5
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version