USN-3528-1: Ruby vulnerabilities
10 January 2018
Several security issues were fixed in Ruby.
Releases
Packages
Details
It was discovered that Ruby incorrectly handled certain terminal emulator
escape sequences. An attacker could use this to execute arbitrary code via
a crafted user name. This issue only affected Ubuntu 16.04 LTS and Ubuntu 17.10.
(CVE-2017-10784)
It was discovered that Ruby incorrectly handled certain strings.
An attacker could use this to cause a denial of service. This issue
only affected Ubuntu 16.04 LTS and Ubuntu 17.10. (CVE-2017-14033)
It was discovered that Ruby incorrectly handled some generating JSON.
An attacker could use this to possible expose sensitive information.
This issue only affected Ubuntu 16.04 LTS and Ubuntu 17.10.
(CVE-2017-14064)
It was discovered that Ruby incorrectly handled certain inputs.
An attacker could use this to execute arbitrary code.
(CVE-2017-17790)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 17.10
Ubuntu 16.04
Ubuntu 14.04
-
libruby1.9.1
-
1.9.3.484-2ubuntu1.7
-
ruby1.9.1
-
1.9.3.484-2ubuntu1.7
-
ruby1.9.3
-
1.9.3.484-2ubuntu1.7
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3685-1: libruby2.0, ruby1.9.3, ruby1.9.1, libruby1.9.1, ruby2.0, ruby2.3, libruby2.3
- USN-3439-1: libruby1.9.1, ruby1.9.3, ruby1.9.1