Linux Security
    Linux Security
    Linux Security

    Ubuntu 3621-1: Ruby vulnerabilities

    Date
    7207
    Posted By
    Several security issues were fixed in Ruby.
    ==========================================================================
    Ubuntu Security Notice USN-3621-1
    April 05, 2018
    
    ruby1.9.1, ruby2.0, ruby2.3 vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 17.10
    - Ubuntu 16.04 LTS
    - Ubuntu 14.04 LTS
    
    Summary:
    
    Several security issues were fixed in Ruby.
    
    Software Description:
    - ruby2.3: Object-oriented scripting language
    - ruby1.9.1: Object-oriented scripting language
    - ruby2.0: Object-oriented scripting language
    
    Details:
    
    It was discovered that Ruby incorrectly handled certain inputs. An
    attacker could possibly use this to access sensitive information. 
    (CVE-2018-1000073)
    
    It was discovered that Ruby incorrectly handled certain files. An
    attacker could possibly use this to execute arbitrary code. 
    (CVE-2018-1000074)
    
    It was discovered that Ruby incorrectly handled certain files. An
    attacker could possibly use this to cause a denial of service. 
    (CVE-2018-1000075)
    
    It was discovered that Ruby incorrectly handled certain crypto
    signatures. An attacker could possibly use this to execute arbitrary
    code. (CVE-2018-1000076)
    
    It was discovered that Ruby incorrectly handled certain inputs. An
    attacker could possibly use this to execute arbitrary code. 
    (CVE-2018-1000077, CVE-2018-1000078, CVE-2018-1000079)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 17.10:
      libruby2.3                      2.3.3-1ubuntu1.4
      ruby2.3                         2.3.3-1ubuntu1.4
    
    Ubuntu 16.04 LTS:
      libruby2.3                      2.3.1-2~16.04.7
      ruby2.3                         2.3.1-2~16.04.7
    
    Ubuntu 14.04 LTS:
      libruby1.9.1                    1.9.3.484-2ubuntu1.8
      libruby2.0                      2.0.0.484-1ubuntu2.6
      ruby1.9.1                       1.9.3.484-2ubuntu1.8
      ruby1.9.3                       1.9.3.484-2ubuntu1.8
      ruby2.0                         2.0.0.484-1ubuntu2.6
    
    In general, a standard system update will make all the necessary
    changes.
    
    References:
      https://usn.ubuntu.com/usn/usn-3621-1
      CVE-2018-1000073, CVE-2018-1000074, CVE-2018-1000075, CVE-2018-
    1000076,
      CVE-2018-1000077, CVE-2018-1000078, CVE-2018-1000079
    
    Package Information:
      https://launchpad.net/ubuntu/+source/ruby2.3/2.3.3-1ubuntu1.4
      https://launchpad.net/ubuntu/+source/ruby2.3/2.3.1-2~16.04.7
      https://launchpad.net/ubuntu/+source/ruby1.9.1/1.9.3.484-2ubuntu1.8
      https://launchpad.net/ubuntu/+source/ruby2.0/2.0.0.484-1ubuntu2.6
    

    Advisories

    LinuxSecurity Poll

    Which aspect of server security are you most interested in learning more about?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/38-which-aspect-of-server-security-are-you-most-interested-in-learning-more-about?task=poll.vote&format=json
    38
    radio
    [{"id":"131","title":"Preventing information leakage","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"132","title":"Firewall considerations","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"133","title":"Permissions ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.