Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in Ruby (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in Ruby (Aktualisierung)
ID: USN-6838-2
Distribution: Ubuntu
Plattformen: Ubuntu 16.04 LTS, Ubuntu 18.04 LTS
Datum: Mo, 10. Februar 2025, 23:21
Referenzen: https://ubuntu.com/security/notices/USN-6838-1
https://www.cve.org/CVERecord?id=CVE-2024-27281
https://ubuntu.com/security/notices/USN-6838-2
Applikationen: Ruby
Update von: Zwei Probleme in Ruby

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============8243834970023940767==
Content-Language: en-US
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------ZAatoNue5euYPaQHm2o0R07A"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------ZAatoNue5euYPaQHm2o0R07A
Content-Type: multipart/mixed;
boundary="------------thyCMVag1ag8ScycSIEbqs66";
protected-headers="v1"
From: Julia Sarris <julia.sarris@canonical.com>
Reply-To: security@ubuntu.com
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <a9304009-3927-40f9-a2e4-2f588381e399@canonical.com>
Subject: [USN-6838-2] Ruby vulnerability

--------------thyCMVag1ag8ScycSIEbqs66
Content-Type: multipart/mixed;
boundary="------------x3cnj7DqE2sq5FX4ZE0wLH4Y"

--------------x3cnj7DqE2sq5FX4ZE0wLH4Y
Content-Type: multipart/alternative;
boundary="------------Nb2gBqWUh5dtLd9TksmwHhdR"

--------------Nb2gBqWUh5dtLd9TksmwHhdR
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================

Ubuntu Security Notice USN-6838-2
February 10, 2025

ruby2.3, ruby2.5 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Ruby could be made to crash or run programs as your login if it
opened a specially crafted file.

Software Description:
- ruby2.5: Object-oriented scripting language
- ruby2.3: Object-oriented scripting language

Details:

USN-6838-1 fixed CVE-2024-27281 in Ruby 2.7, Ruby 3.0, Ruby 3.1,
and Ruby 3.2. This update provides the corresponding updates for
Ruby 2.3 and Ruby 2.5.

Original advisory details:

 It was discovered that Ruby RDoc incorrectly parsed certain YAML files. If
 a user or automated system were tricked into parsing a specially crafted
 .rdoc_options file, a remote attacker could possibly use this issue to
 execute arbitrary code. (CVE-2024-27281)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
  libruby2.5                      2.5.1-1ubuntu1.16+esm3
                                  Available with Ubuntu Pro
  ruby2.5                         2.5.1-1ubuntu1.16+esm3
                                  Available with Ubuntu Pro

Ubuntu 16.04 LTS
  libruby2.3                      2.3.1-2~ubuntu16.04.16+esm9
                                  Available with Ubuntu Pro
  ruby2.3                         2.3.1-2~ubuntu16.04.16+esm9
                                  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6838-2
<https://ubuntu.com/security/notices/USN-6838-2>
https://ubuntu.com/security/notices/USN-6838-1
<https://ubuntu.com/security/notices/USN-6838-1>
  CVE-2024-27281

--------------Nb2gBqWUh5dtLd9TksmwHhdR
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE html>
<html>
<head>

<meta http-equiv=3D"Content-Type" content=3D"text/html;
charset=3DUTF=
-8">
</head>
<body>

<p>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D</p>
<div id=3D":1ui" class=3D"a3s aiL ">
Ubuntu Security Notice USN-6838-2<br>
February 10, 2025<br>
<br>
ruby2.3, ruby2.5 vulnerability<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D<wbr>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<wbr>=3D=3D=3D=3D=3D=3D=3D=3D=3D
=
=3D=3D=3D=3D=3D<br>
<br>
A security issue affects these releases of Ubuntu and its
derivatives:<br>
<br>
- Ubuntu 18.04 LTS<br>
- Ubuntu 16.04 LTS<br>
<br>
Summary:<br>
<br>
Ruby could be made to crash or run programs as your login if
it<br>=

opened a specially crafted file.<br>
<br>
Software Description:<br>
- ruby2.5: Object-oriented scripting language<br>
- ruby2.3: Object-oriented scripting language<br>
<br>
Details:<br>
<br>
USN-6838-1 fixed CVE-2024-27281 in Ruby 2.7, Ruby 3.0, Ruby 3.1,<br=
>
and Ruby 3.2. This update provides the corresponding updates for<br=
>
Ruby 2.3 and Ruby 2.5.<br>
<br>
Original advisory details:<br>
<br>
=C2=A0It was discovered that Ruby RDoc incorrectly parsed certain Y=
AML
files. If<br>
=C2=A0a user or automated system were tricked into parsing a specia=
lly
crafted<br>
=C2=A0.rdoc_options file, a remote attacker could possibly use this=

issue to<br>
=C2=A0execute arbitrary code. (CVE-2024-27281)<br>
<br>
Update instructions:<br>
<br>
The problem can be corrected by updating your system to the
following<br>
package versions:<br>
<br>
Ubuntu 18.04 LTS<br>
=C2=A0 libruby2.5=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 2.5.1-1ubuntu1.16+esm3<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Available with Ubuntu P=
ro<br>
=C2=A0 ruby2.5=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A02.5.1-1ubuntu1.16+esm3<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Available with Ubuntu P=
ro<br>
<br>
Ubuntu 16.04 LTS<br>
=C2=A0 libruby2.3=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 2.3.1-2~ubuntu16.04.16+esm9<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Available with Ubuntu P=
ro<br>
=C2=A0 ruby2.3=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A02.3.1-2~ubuntu16.04.16+esm9<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Available with Ubuntu P=
ro<br>
<br>
In general, a standard system update will make all the necessary
changes.<br>
<br>
References:<br>
=C2=A0 <a href=3D"https://ubuntu.com/security/notices/USN-6838-2"
rel=3D"noreferrer" target=3D"_blank"
data-saferedirecturl=3D"https://www.google.com/url?q=3Dhttps://ubuntu.com=
/security/notices/USN-6838-2&amp;source=3Dgmail&amp;ust=3D173930867893400
=
0&amp;usg=3DAOvVaw0ewFUVoyb2-LBdvIOFP_sG">https://ubuntu.com/security/no<=
wbr>tices/USN-6838-2</a><br>
=C2=A0 <a href=3D"https://ubuntu.com/security/notices/USN-6838-1"
rel=3D"noreferrer" target=3D"_blank"
data-saferedirecturl=3D"https://www.google.com/url?q=3Dhttps://ubuntu.com=
/security/notices/USN-6838-1&amp;source=3Dgmail&amp;ust=3D173930867893400
=
0&amp;usg=3DAOvVaw1DZ4Rw5goc0YE_bfvBY7AU">https://ubuntu.com/security/no<=
wbr>tices/USN-6838-1</a><br>
=C2=A0 CVE-2024-27281
<div class=3D"yj6qo"></div>
<div class=3D"adL"><br>
</div>
</div>
</body>
</html>

--------------Nb2gBqWUh5dtLd9TksmwHhdR--

--------------x3cnj7DqE2sq5FX4ZE0wLH4Y
Content-Type: application/pgp-keys;
name="OpenPGP_0x401EFCBCDA0FF1BD.asc"
Content-Disposition: attachment;
filename="OpenPGP_0x401EFCBCDA0FF1BD.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D=3D
=3DQkbp
-----END PGP PUBLIC KEY BLOCK-----

--------------x3cnj7DqE2sq5FX4ZE0wLH4Y--

--------------thyCMVag1ag8ScycSIEbqs66--

--------------ZAatoNue5euYPaQHm2o0R07A
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature.asc"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEOMd9M4Vpc6WHYvv+QB78vNoP8b0FAmeqbXEFAwAAAAAACgkQQB78vNoP8b2l
jAf+KLvsymMgLtnqIbVKFwVy4OFVBVlAuUkNTULKQelUuOhJeBcUVWnU6nYOJU45DZhzKMw8fJ+t
NXy+YjH8RvMsYy3K3E4aGreynZpzDsRNS4MkckC+IsZH0HEevnzfgoczv/N9SqxRF49V8SLOEp8h
tYfQwvvmaJFaYZfr+AOo96An6tW6CzmFsvE9CKJnn9fNhgdipjJlSTu5X9TS4c3VsaLAODfq5jQc
VSo2W7VWGdD+ff73Vta8L8J0hQvJ1FAosfp+SiSZ7O0tlaRotymSLfNjWGOlEAqI025QEDnKqofn
B6AVXonmY5MLIJj1FiRDTfPuS4nhGtJD43YxCV33IQ==
=k0aK
-----END PGP SIGNATURE-----

--------------ZAatoNue5euYPaQHm2o0R07A--


--===============8243834970023940767==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============8243834970023940767==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung