[USN-3439-1] Ruby vulnerabilities
Several security issues were fixed in Ruby.
It was discovered that Ruby incorrectly handled certain inputs.
An attacker could use this to cause a buffer overrun.
(CVE-2017-0898)
Yusuke Endoh discovered that Ruby incorrectly handled certain files.
An attacker could use this to execute terminal escape sequences.
(CVE-2017-0899)
Yusuke Endoh discovered that Ruby incorrectly handled certain inputs.
An attacker could use this to cause a denial of service.
(CVE-2017-0900)
It was discovered that Ruby incorrectly handled certain files.
An attacker could use this to overwrite any file on the filesystem.
(CVE-2017-0901)
It was discovered that Ruby incorrectly handled certain inputs.
An attacker could use this to execute arbitrary code.
(CVE-2017-10784)
It was discovered that Ruby incorrectly handled certain inputs.
An attacker could use this to cause a denial of service.
(CVE-2017-14033)
It was discovered that Ruby incorrectly handled certain files.
An attacker could use this to expose sensitive information.
(CVE-2017-14064)
Package | Affected Version |
---|---|
pkg:deb/ubuntu/ruby1.9.3?distro=trusty | < 1.9.3.484-2ubuntu1.5 |
pkg:deb/ubuntu/ruby1.9.1?distro=trusty | < 1.9.3.484-2ubuntu1.5 |
pkg:deb/ubuntu/ruby1.9.1-full?distro=trusty | < 1.9.3.484-2ubuntu1.5 |
pkg:deb/ubuntu/ruby1.9.1-examples?distro=trusty | < 1.9.3.484-2ubuntu1.5 |
pkg:deb/ubuntu/ruby1.9.1-dev?distro=trusty | < 1.9.3.484-2ubuntu1.5 |
pkg:deb/ubuntu/ri1.9.1?distro=trusty | < 1.9.3.484-2ubuntu1.5 |
pkg:deb/ubuntu/libtcltk-ruby1.9.1?distro=trusty | < 1.9.3.484-2ubuntu1.5 |
pkg:deb/ubuntu/libruby1.9.1?distro=trusty | < 1.9.3.484-2ubuntu1.5 |
- ID
- USN-3439-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-3439-1
- Published
-
2017-10-05T16:05:42
(7 years ago) - Modified
-
2017-10-05T16:05:42
(7 years ago) - Other Advisories
-
- ALAS-2017-906
- ALAS-2017-915
- ALPINE:CVE-2017-0898
- ALPINE:CVE-2017-0899
- ALPINE:CVE-2017-0900
- ALPINE:CVE-2017-0901
- ALPINE:CVE-2017-10784
- ALPINE:CVE-2017-14033
- ALPINE:CVE-2017-14064
- DSA-3966-1
- DSA-4031-1
- ELSA-2018-0378
- FEDORA-2017-20214ad330
- FEDORA-2017-4166994614
- FEDORA-2017-6e6f4f95e6
- FEDORA-2017-81cf93b7c2
- FEDORA-2017-e136d63c99
- FREEBSD:95B01379-9D52-11E7-A25C-471BAFC3262F
- GLSA-201710-01
- GLSA-201710-18
- RHSA-2018:0378
- RUBYSEC:OPENSSL-2017-14033
- RUBYSEC:RUBYGEMS-UPDATE-2017-0899
- RUBYSEC:RUBYGEMS-UPDATE-2017-0900
- RUBYSEC:RUBYGEMS-UPDATE-2017-0901
- RUBYSEC:WEBRICK-2017-10784
- SSA:2017-261-03
- SUSE-SU-2020:1570-1
- USN-3528-1
- USN-3553-1
- USN-3685-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/ruby1.9.3?distro=trusty | ubuntu | ruby1.9.3 | < 1.9.3.484-2ubuntu1.5 | trusty | ||
Affected | pkg:deb/ubuntu/ruby1.9.1?distro=trusty | ubuntu | ruby1.9.1 | < 1.9.3.484-2ubuntu1.5 | trusty | ||
Affected | pkg:deb/ubuntu/ruby1.9.1-full?distro=trusty | ubuntu | ruby1.9.1-full | < 1.9.3.484-2ubuntu1.5 | trusty | ||
Affected | pkg:deb/ubuntu/ruby1.9.1-examples?distro=trusty | ubuntu | ruby1.9.1-examples | < 1.9.3.484-2ubuntu1.5 | trusty | ||
Affected | pkg:deb/ubuntu/ruby1.9.1-dev?distro=trusty | ubuntu | ruby1.9.1-dev | < 1.9.3.484-2ubuntu1.5 | trusty | ||
Affected | pkg:deb/ubuntu/ri1.9.1?distro=trusty | ubuntu | ri1.9.1 | < 1.9.3.484-2ubuntu1.5 | trusty | ||
Affected | pkg:deb/ubuntu/libtcltk-ruby1.9.1?distro=trusty | ubuntu | libtcltk-ruby1.9.1 | < 1.9.3.484-2ubuntu1.5 | trusty | ||
Affected | pkg:deb/ubuntu/libruby1.9.1?distro=trusty | ubuntu | libruby1.9.1 | < 1.9.3.484-2ubuntu1.5 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |