{"id":"USN-5462-2","summary":"ruby2.3 vulnerability","details":"USN-5462-1 fixed several vulnerabilities in Ruby. This update provides\nthe corresponding CVE-2022-28739 update for ruby2.3 on Ubuntu 16.04 ESM.\n\nOriginal advisory details:\n\nIt was discovered that Ruby incorrectly handled certain inputs.\nAn attacker could possibly use this issue to expose sensitive information.\n","modified":"2026-04-22T10:24:59.115422Z","published":"2022-06-06T22:21:58Z","related":["UBUNTU-CVE-2022-28739"],"upstream":["CVE-2022-28739","UBUNTU-CVE-2022-28739"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5462-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-28739"}],"affected":[{"package":{"name":"ruby2.3","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/ruby2.3@2.3.1-2~ubuntu16.04.16+esm3?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.3.1-2~ubuntu16.04.16+esm3"}]}],"versions":["2.3.0-1","2.3.0-2","2.3.0-4ubuntu2","2.3.0-4ubuntu3","2.3.0-5ubuntu1","2.3.1-2~16.04","2.3.1-2~16.04.2","2.3.1-2~16.04.4","2.3.1-2~16.04.5","2.3.1-2~16.04.6","2.3.1-2~16.04.7","2.3.1-2~16.04.9","2.3.1-2~16.04.10","2.3.1-2~16.04.11","2.3.1-2~16.04.12","2.3.1-2~ubuntu16.04.13","2.3.1-2~ubuntu16.04.14","2.3.1-2~ubuntu16.04.15","2.3.1-2~ubuntu16.04.16","2.3.1-2~ubuntu16.04.16+esm1","2.3.1-2~ubuntu16.04.16+esm2"],"ecosystem_specific":{"binaries":[{"binary_name":"libruby2.3","binary_version":"2.3.1-2~ubuntu16.04.16+esm3"},{"binary_name":"ruby2.3","binary_version":"2.3.1-2~ubuntu16.04.16+esm3"},{"binary_name":"ruby2.3-tcltk","binary_version":"2.3.1-2~ubuntu16.04.16+esm3"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5462-2.json","cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"id":"CVE-2022-28739","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}]}]}}}],"schema_version":"1.7.5"}