USN-3439-1: Ruby vulnerabilities
5 October 2017
Several security issues were fixed in Ruby.
Releases
Packages
- ruby1.9.1 - Object-oriented scripting language
Details
It was discovered that Ruby incorrectly handled certain inputs.
An attacker could use this to cause a buffer overrun.
(CVE-2017-0898)
Yusuke Endoh discovered that Ruby incorrectly handled certain files.
An attacker could use this to execute terminal escape sequences.
(CVE-2017-0899)
Yusuke Endoh discovered that Ruby incorrectly handled certain inputs.
An attacker could use this to cause a denial of service.
(CVE-2017-0900)
It was discovered that Ruby incorrectly handled certain files.
An attacker could use this to overwrite any file on the filesystem.
(CVE-2017-0901)
It was discovered that Ruby incorrectly handled certain inputs.
An attacker could use this to execute arbitrary code.
(CVE-2017-10784)
It was discovered that Ruby incorrectly handled certain inputs.
An attacker could use this to cause a denial of service.
(CVE-2017-14033)
It was discovered that Ruby incorrectly handled certain files.
An attacker could use this to expose sensitive information.
(CVE-2017-14064)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04
-
libruby1.9.1
-
1.9.3.484-2ubuntu1.5
-
ruby1.9.1
-
1.9.3.484-2ubuntu1.5
-
ruby1.9.3
-
1.9.3.484-2ubuntu1.5
In general, a standard system update will make all the necessary changes.
Related notices
- USN-3685-1: ruby2.3-dev, ruby1.9.1, libruby2.0, ruby1.9.1-full, libruby1.9.1, libruby2.3, libtcltk-ruby1.9.1, ruby1.9.1-examples, ruby2.0-tcltk, ruby2.0, ruby2.0-doc, ruby2.3-doc, ruby2.0-dev, ruby2.3, ruby2.3-tcltk, ruby1.9.3, ri1.9.1, ruby1.9.1-dev
- USN-3553-1: libruby2.3, ruby2.3-doc, ruby2.3-tcltk, ruby2.3, ruby2.3-dev
- USN-3528-1: ruby2.3-dev, ruby1.9.1, ruby1.9.1-full, libruby1.9.1, libruby2.3, libtcltk-ruby1.9.1, ruby1.9.1-examples, ruby2.3-doc, ruby2.3-tcltk, ruby2.3, ruby1.9.3, ri1.9.1, ruby1.9.1-dev