USN-3439-1: Ruby vulnerabilities

05 October 2017

Several security issues were fixed in Ruby.

Releases

Packages

  • ruby1.9.1 - Object-oriented scripting language

Details

It was discovered that Ruby incorrectly handled certain inputs.
An attacker could use this to cause a buffer overrun.
(CVE-2017-0898)

Yusuke Endoh discovered that Ruby incorrectly handled certain files.
An attacker could use this to execute terminal escape sequences.
(CVE-2017-0899)

Yusuke Endoh discovered that Ruby incorrectly handled certain inputs.
An attacker could use this to cause a denial of service.
(CVE-2017-0900)

It was discovered that Ruby incorrectly handled certain files.
An attacker could use this to overwrite any file on the filesystem.
(CVE-2017-0901)

It was discovered that Ruby incorrectly handled certain inputs.
An attacker could use this to execute arbitrary code.
(CVE-2017-10784)

It was discovered that Ruby incorrectly handled certain inputs.
An attacker could use this to cause a denial of service.
(CVE-2017-14033)

It was discovered that Ruby incorrectly handled certain files.
An attacker could use this to expose sensitive information.
(CVE-2017-14064)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04

In general, a standard system update will make all the necessary changes.

Related notices

  • USN-3553-1: libruby2.3, ruby2.3-doc, ruby2.3-tcltk, ruby2.3-dev, ruby2.3
  • USN-3685-1: libtcltk-ruby1.9.1, ruby1.9.3, ruby2.0-doc, ri1.9.1, libruby2.3, ruby1.9.1, ruby1.9.1-examples, ruby2.3-doc, libruby1.9.1, ruby2.3-tcltk, libruby2.0, ruby2.0-dev, ruby2.0-tcltk, ruby2.3, ruby1.9.1-dev, ruby2.3-dev, ruby1.9.1-full, ruby2.0
  • USN-3528-1: libtcltk-ruby1.9.1, ruby1.9.3, ri1.9.1, libruby2.3, ruby1.9.1, ruby1.9.1-examples, ruby2.3-doc, libruby1.9.1, ruby2.3-tcltk, ruby2.3, ruby2.3-dev, ruby1.9.1-dev, ruby1.9.1-full