Ubuntu Security Notice USN-3528-1
10th January, 2018
ruby1.9.1, ruby2.3 vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
Several security issues were fixed in Ruby.
Software description
It was discovered that Ruby incorrectly handled certain terminal emulator
escape sequences. An attacker could use this to execute arbitrary code via
a crafted user name. This issue only affected Ubuntu 16.04 LTS and Ubuntu 17.10.
(CVE-2017-10784)
It was discovered that Ruby incorrectly handled certain strings.
An attacker could use this to cause a denial of service. This issue
only affected Ubuntu 16.04 LTS and Ubuntu 17.10. (CVE-2017-14033)
It was discovered that Ruby incorrectly handled some generating JSON.
An attacker could use this to possible expose sensitive information.
This issue only affected Ubuntu 16.04 LTS and Ubuntu 17.10.
(CVE-2017-14064)
It was discovered that Ruby incorrectly handled certain inputs.
An attacker could use this to execute arbitrary code.
(CVE-2017-17790)
Update instructions
The problem can be corrected by updating your system to the following package version:
Ubuntu 17.10:
libruby2.3 2.3.3-1ubuntu1.2
ruby2.3 2.3.3-1ubuntu1.2
Ubuntu 16.04 LTS:
libruby2.3 2.3.1-2~16.04.5
ruby2.3 2.3.1-2~16.04.5
Ubuntu 14.04 LTS:
ruby1.9.1 1.9.3.484-2ubuntu1.7
ruby1.9.3 1.9.3.484-2ubuntu1.7
libruby1.9.1 1.9.3.484-2ubuntu1.7
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
References
CVE-2017-10784, CVE-2017-14033, CVE-2017-14064, CVE-2017-17790
Continue reading...
10th January, 2018
ruby1.9.1, ruby2.3 vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Several security issues were fixed in Ruby.
Software description
- ruby1.9.1 - Interpreter of object-oriented scripting language Ruby
- ruby2.3 - Interpreter of object-oriented scripting language Ruby
It was discovered that Ruby incorrectly handled certain terminal emulator
escape sequences. An attacker could use this to execute arbitrary code via
a crafted user name. This issue only affected Ubuntu 16.04 LTS and Ubuntu 17.10.
(CVE-2017-10784)
It was discovered that Ruby incorrectly handled certain strings.
An attacker could use this to cause a denial of service. This issue
only affected Ubuntu 16.04 LTS and Ubuntu 17.10. (CVE-2017-14033)
It was discovered that Ruby incorrectly handled some generating JSON.
An attacker could use this to possible expose sensitive information.
This issue only affected Ubuntu 16.04 LTS and Ubuntu 17.10.
(CVE-2017-14064)
It was discovered that Ruby incorrectly handled certain inputs.
An attacker could use this to execute arbitrary code.
(CVE-2017-17790)
Update instructions
The problem can be corrected by updating your system to the following package version:
Ubuntu 17.10:
libruby2.3 2.3.3-1ubuntu1.2
ruby2.3 2.3.3-1ubuntu1.2
Ubuntu 16.04 LTS:
libruby2.3 2.3.1-2~16.04.5
ruby2.3 2.3.1-2~16.04.5
Ubuntu 14.04 LTS:
ruby1.9.1 1.9.3.484-2ubuntu1.7
ruby1.9.3 1.9.3.484-2ubuntu1.7
libruby1.9.1 1.9.3.484-2ubuntu1.7
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
References
CVE-2017-10784, CVE-2017-14033, CVE-2017-14064, CVE-2017-17790
Continue reading...