drucken bookmarks versenden konfigurieren admin pdf Sicherheit: XML External Entity-Verarbeitung in Ruby
Name: |
XML External Entity-Verarbeitung in Ruby |
|
ID: |
USN-4922-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 20.10 |
|
Datum: |
Di, 20. April 2021, 23:00 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28965 |
|
Applikationen: |
Ruby |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============6251973461392374129== Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="JFCCG9XVfQOiyr3NTzOSxpqi11JWcrc7t"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --JFCCG9XVfQOiyr3NTzOSxpqi11JWcrc7t Content-Type: multipart/mixed; boundary="ru2sG1PW7UTp7fseEkZ1jUXl4TA5FBy78"; protected-headers="v1" From: Marc Deslauriers <marc.deslauriers@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: "ubuntu-security-announce@lists.ubuntu.com" <ubuntu-security-announce@lists.ubuntu.com> Message-ID: <84b76cda-32cf-13ea-0386-e45d26ac2756@canonical.com> Subject: [USN-4922-1] Ruby vulnerability
--ru2sG1PW7UTp7fseEkZ1jUXl4TA5FBy78 Content-Type: text/plain; charset=utf-8 Content-Language: en-C Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-4922-1 April 20, 2021
ruby2.3, ruby2.5, ruby2.7 vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS
Summary:
Ruby incorrectly handled XML documents.
Software Description: - ruby2.7: Object-oriented scripting language - ruby2.5: Object-oriented scripting language - ruby2.3: Object-oriented scripting language
Details:
Juho Nurminen discovered that the REXML gem bundled with Ruby incorrectly parsed and serialized XML documents. A remote attacker could possibly use this issue to perform an XML round-trip attack.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.10: libruby2.7 2.7.1-3ubuntu1.3 ruby2.7 2.7.1-3ubuntu1.3
Ubuntu 20.04 LTS: libruby2.7 2.7.0-5ubuntu1.4 ruby2.7 2.7.0-5ubuntu1.4
Ubuntu 18.04 LTS: libruby2.5 2.5.1-1ubuntu1.9 ruby2.5 2.5.1-1ubuntu1.9
Ubuntu 16.04 LTS: libruby2.3 2.3.1-2~ubuntu16.04.16 ruby2.3 2.3.1-2~ubuntu16.04.16
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-4922-1 CVE-2021-28965
Package Information: https://launchpad.net/ubuntu/+source/ruby2.7/2.7.1-3ubuntu1.3 https://launchpad.net/ubuntu/+source/ruby2.7/2.7.0-5ubuntu1.4 https://launchpad.net/ubuntu/+source/ruby2.5/2.5.1-1ubuntu1.9 https://launchpad.net/ubuntu/+source/ruby2.3/2.3.1-2~ubuntu16.04.16
--ru2sG1PW7UTp7fseEkZ1jUXl4TA5FBy78--
--JFCCG9XVfQOiyr3NTzOSxpqi11JWcrc7t Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAmB/GnIACgkQZWnYVadE vpN3JRAAvV4XS1KHwbbU4OIJEQHwiheK7xk++yHOItVAh42D7P3BR1ujXzzuTvLe sK4FrcXuPtisVEd6kFJBOTgGME1V3p0ms8+NqcEcanMFSMStn8d4jUXebvgiSvCs MonRAach1tA6zJu/7BnAuimS9KgAkH5550UAmPN95OaRGHmIYBJqVJphUxyEJciu fUtQkHjTJoihsRWxAmjARzo3+Mgk4RVlQHhiUd+Mv4i8wNiWUqBXqfDhK6AjBIUs vAQGx38bnzcVq0T6oiWCV8T+/2TX8cIrmuawwYRKgotFAuZK//LwzFffP+c7IUp/ 3iqoIrKWRXDeQwWYZj0FqwpKEXeTW36Ct8fEGuTKB6O4kbsp/ktxf7BECOUtkcxK P87gXwfnzXpJyxIm9HKLZZXtgJeLOyCEre1n200omhZ4XZCB9rhz47eOnNMtCTZP fechSFYeONnahACwN68EpSeNHWO8drmm4TZ1nZoM0fpwgqkSFHwW5VgVJzsfFR6r m5Zer4/TmMN4GZ5mqPzFC+1E3s8+op/rhFq7FMmH8fUSOTpXs/Eqz63tWBFEUEtw bz9qJk8zJErkUGbZUikiAS2fEp9UZdswEu9dW3z7iohid7wTu8SZio9rxYGEHBCV Gns1msgGK4qxgMZx5vEVS4vmEXywS/J9gq7UfWSmBhfl2Pi6YKQ= =V5qi -----END PGP SIGNATURE-----
--JFCCG9XVfQOiyr3NTzOSxpqi11JWcrc7t--
--===============6251973461392374129== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============6251973461392374129==--
|
|
|
|