Mehrere Probleme in Ruby
ID: | USN-3439-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 14.04 LTS |
Datum: | Do, 5. Oktober 2017, 20:15 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14033 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10748 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0898 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10784 |
Applikationen: | Ruby |
Originalnachricht |
|
--===============6488132517662792669== Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="=-7dASnbKDPQMAuSnbW/LB" --=-7dASnbKDPQMAuSnbW/LB Content-Type: text/plain; charset="UTF-8 Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-3439-1 October 05, 2017 ruby1.9.1 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 LTS Summary: Several security issues were fixed in Ruby. Software Description: - ruby1.9.1: Object-oriented scripting language Details: It was discovered that Ruby incorrectly handled certain inputs. An attacker could use this to cause a buffer overrun. (CVE-2017-0898) Yusuke Endoh discovered that Ruby incorrectly handled certain files. An attacker could use this to execute terminal escape sequences. (CVE-2017-0899) Yusuke Endoh discovered that Ruby incorrectly handled certain inputs. An attacker could use this to cause a denial of service. (CVE-2017-0900) It was discovered that Ruby incorrectly handled certain files. An attacker could use this to overwrite any file on the filesystem. (CVE-2017-0901) It was discovered that Ruby incorrectly handled certain inputs. An attacker could use this to execute arbitrary code. (CVE-2017-10784) It was discovered that Ruby incorrectly handled certain inputs. An attacker could use this to cause a denial of service. (CVE-2017-14033) It was discovered that Ruby incorrectly handled certain files. An attacker could use this to expose sensitive information. (CVE-2017-14064) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: Â libruby1.9.1Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â 1.9.3.484-2ubuntu1.5 Â ruby1.9.1Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â 1.9.3.484-2ubuntu1.5 Â ruby1.9.3Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â 1.9.3.484-2ubuntu1.5 In general, a standard system update will make all the necessary changes. References: Â https://www.ubuntu.com/usn/usn-3439-1 Â CVE-2017-0898, CVE-2017-0899, CVE-2017-0900, CVE-2017-0901, Â CVE-2017-10748, CVE-2017-14033, CVE-2017-14064 Package Information: Â https://launchpad.net/ubuntu/+source/ruby1.9.1/1.9.3.484-2ubuntu1.5 --×dASnbKDPQMAuSnbW/LB Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAABCAAGBQJZ1mNVAAoJEEW851uECx9p/dsP/2oChAvpPQRdb1Sxbv+9U+01 j/z4jxrxBfn/zxxsx1UXhXVkVYZLNNVJp0TXJn3o9ig3oZiP34fr8A36UcdXAgXF HGHxacrwQ89oPSyncZeqj+tqhDZsupoo6WXolNgx102xK/XjmStY/cPYDbVN+/UN dUbKvxQsulGJRWoX+lqWmaP5Sb/HiATkjtTcEADaf4wgw64COOMi8+FS6JZX/0wo +5yIB41c3U+a8QeMKYfuR+k4+oEJfkxFXN090pOMKKzoZlKOEC7ctmJFr9Qw0MB8 CwAT6zIjdsaLCVyHj2NcW9Ijeu1/nO2kjdgMWpEiFx6fhAYRSEd2kXJvf7N2gPMj Vs0eXrqPGTZnz5v0qAfo8BRCUAVvLad4JwWOdUojKnwUOCGwE7wEFgFifF9mhPeh CDfLLMH9xnmb/lnTcL5Ki/dLBADjyn1fyye1dzH+oOJRuNUldKTyafEUedKWdvxV Ap9n4h9uAiyuJD/vq0dlocKK9NrbKY02HgfccHkG86b0ESc+cX0cuRM5Lm+spSiD ld+Va/VHNOoT8ab6EDieKTmALs0SSsaOCJ6WGvadVOBS/KrintsOLYTdu1N9nqG5 vfGJbbixceSAZBN629gzvUvHjPPHXdpLfyewquLEDX6d6n0C/sWktb1knpkeXvz7 oE9qIOoIgYTFzeT5+4t5 =gmid -----END PGP SIGNATURE----- --=-7dASnbKDPQMAuSnbW/LB-- --===============6488132517662792669== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK --===============6488132517662792669==-- |