USN-3515-1: Ruby vulnerability
Ubuntu Security Notice USN-3515-1
4th January, 2018
ruby1.9.1, ruby2.0, ruby2.3 vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.10
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Ruby could be made to execute arbitrary commands if opened a specially crafted file.
- ruby1.9.1 - Object-oriented scripting language
- ruby2.0 - Object-oriented scripting language
- ruby2.3 - Interpreter of object-oriented scripting language Ruby
It was discovered that Ruby allows FTP command injection.
An attacker could use this to cause arbitrary command execution.
The problem can be corrected by updating your system to the following package version:
- Ubuntu 17.10:
- libruby2.3 2.3.3-1ubuntu1.1
- ruby2.3 2.3.3-1ubuntu1.1
- Ubuntu 17.04:
- libruby2.3 2.3.3-1ubuntu0.3
- ruby2.3 2.3.3-1ubuntu0.3
- Ubuntu 16.04 LTS:
- libruby2.3 2.3.1-2~16.04.4
- ruby2.3 2.3.1-2~16.04.4
- Ubuntu 14.04 LTS:
- libruby2.0 18.104.22.1684-1ubuntu2.5
- ruby1.9.1 22.214.171.1244-2ubuntu1.6
- libruby1.9.1 126.96.36.1994-2ubuntu1.6
- ruby1.9.3 188.8.131.524-2ubuntu1.6
- ruby2.0 184.108.40.2064-1ubuntu2.5
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.