Login
Newsletter
Werbung

Sicherheit: XML External Entity-Verarbeitung in Ruby
Aktuelle Meldungen Distributionen
Name: XML External Entity-Verarbeitung in Ruby
ID: USN-4922-1
Distribution: Ubuntu
Plattformen: Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 20.10
Datum: Di, 20. April 2021, 23:00
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28965
Applikationen: Ruby

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============6251973461392374129==
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="JFCCG9XVfQOiyr3NTzOSxpqi11JWcrc7t"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--JFCCG9XVfQOiyr3NTzOSxpqi11JWcrc7t
Content-Type: multipart/mixed;
boundary="ru2sG1PW7UTp7fseEkZ1jUXl4TA5FBy78";
protected-headers="v1"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: "ubuntu-security-announce@lists.ubuntu.com"
<ubuntu-security-announce@lists.ubuntu.com>
Message-ID: <84b76cda-32cf-13ea-0386-e45d26ac2756@canonical.com>
Subject: [USN-4922-1] Ruby vulnerability

--ru2sG1PW7UTp7fseEkZ1jUXl4TA5FBy78
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-4922-1
April 20, 2021

ruby2.3, ruby2.5, ruby2.7 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Ruby incorrectly handled XML documents.

Software Description:
- ruby2.7: Object-oriented scripting language
- ruby2.5: Object-oriented scripting language
- ruby2.3: Object-oriented scripting language

Details:

Juho Nurminen discovered that the REXML gem bundled with Ruby incorrectly
parsed and serialized XML documents. A remote attacker could possibly use
this issue to perform an XML round-trip attack.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.10:
libruby2.7 2.7.1-3ubuntu1.3
ruby2.7 2.7.1-3ubuntu1.3

Ubuntu 20.04 LTS:
libruby2.7 2.7.0-5ubuntu1.4
ruby2.7 2.7.0-5ubuntu1.4

Ubuntu 18.04 LTS:
libruby2.5 2.5.1-1ubuntu1.9
ruby2.5 2.5.1-1ubuntu1.9

Ubuntu 16.04 LTS:
libruby2.3 2.3.1-2~ubuntu16.04.16
ruby2.3 2.3.1-2~ubuntu16.04.16

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-4922-1
CVE-2021-28965

Package Information:
https://launchpad.net/ubuntu/+source/ruby2.7/2.7.1-3ubuntu1.3
https://launchpad.net/ubuntu/+source/ruby2.7/2.7.0-5ubuntu1.4
https://launchpad.net/ubuntu/+source/ruby2.5/2.5.1-1ubuntu1.9
https://launchpad.net/ubuntu/+source/ruby2.3/2.3.1-2~ubuntu16.04.16


--ru2sG1PW7UTp7fseEkZ1jUXl4TA5FBy78--

--JFCCG9XVfQOiyr3NTzOSxpqi11JWcrc7t
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----
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=V5qi
-----END PGP SIGNATURE-----

--JFCCG9XVfQOiyr3NTzOSxpqi11JWcrc7t--


--===============6251973461392374129==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============6251973461392374129==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung