========================================================================== Ubuntu Security Notice USN-3685-1 June 13, 2018 ruby1.9.1, ruby2.0, ruby2.3 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 17.10 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS Summary: Several security issues were fixed in Ruby. Software Description: - ruby2.3: Object-oriented scripting language - ruby1.9.1: Object-oriented scripting language - ruby2.0: Object-oriented scripting language Details: Some of these CVE were already addressed in previous USN: 3439-1, 3553-1, 3528-1. Here we address for the remain releases. It was discovered that Ruby incorrectly handled certain inputs. An attacker could use this to cause a buffer overrun. (CVE-2017-0898) It was discovered that Ruby incorrectly handled certain files. An attacker could use this to overwrite any file on the filesystem. (CVE-2017-0901) It was discovered that Ruby was vulnerable to a DNS hijacking vulnerability. An attacker could use this to possibly force the RubyGems client to download and install gems from a server that the attacker controls. (CVE-2017-0902) It was discovered that Ruby incorrectly handled certain YAML files. An attacker could use this to possibly execute arbitrary code. (CVE-2017-0903) It was discovered that Ruby incorrectly handled certain files. An attacker could use this to expose sensitive information. (CVE-2017-14064) It was discovered that Ruby incorrectly handled certain inputs. An attacker could use this to execute arbitrary code. (CVE-2017-10784) It was discovered that Ruby incorrectly handled certain network requests. An attacker could possibly use this to inject a crafted key into a HTTP response. (CVE-2017-17742) It was discovered that Ruby incorrectly handled certain files. An attacker could possibly use this to execute arbitrary code. This update is only addressed to ruby2.0. (CVE-2018-1000074) It was discovered that Ruby incorrectly handled certain network requests. An attacker could possibly use this to cause a denial of service. (CVE-2018-8777) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 17.10: libruby2.3 2.3.3-1ubuntu1.6 ruby2.3 2.3.3-1ubuntu1.6 Ubuntu 16.04 LTS: libruby2.3 2.3.1-2~16.04.10 ruby2.3 2.3.1-2~16.04.10 Ubuntu 14.04 LTS: libruby1.9.1 1.9.3.484-2ubuntu1.12 libruby2.0 2.0.0.484-1ubuntu2.10 ruby1.9.1 1.9.3.484-2ubuntu1.12 ruby1.9.3 1.9.3.484-2ubuntu1.12 ruby2.0 2.0.0.484-1ubuntu2.10 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/usn/usn-3685-1 CVE-2017-0898, CVE-2017-0901, CVE-2017-0902, CVE-2017-0903, CVE-2017-10784, CVE-2017-14064, CVE-2017-17742, CVE-2018-1000074, CVE-2018-8777 Package Information: https://launchpad.net/ubuntu/+source/ruby2.3/2.3.3-1ubuntu1.6 https://launchpad.net/ubuntu/+source/ruby2.3/2.3.1-2~16.04.10 https://launchpad.net/ubuntu/+source/ruby1.9.1/1.9.3.484-2ubuntu1.12 https://launchpad.net/ubuntu/+source/ruby2.0/2.0.0.484-1ubuntu2.10