USN-3365-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-3365-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-3365-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-3365-1
Related
Published
2017-07-25T17:52:34.131041Z
Modified
2017-07-25T17:52:34.131041Z
Summary
ruby1.9.1, ruby2.0, ruby2.3 vulnerabilities
Details

It was discovered that Ruby DL::dlopen incorrectly handled opening libraries. An attacker could possibly use this issue to open libraries with tainted names. This issue only applied to Ubuntu 14.04 LTS. (CVE-2009-5147)

Tony Arcieri, Jeffrey Walton, and Steffan Ullrich discovered that the Ruby OpenSSL extension incorrectly handled hostname wildcard matching. This issue only applied to Ubuntu 14.04 LTS. (CVE-2015-1855)

Christian Hofstaedtler discovered that Ruby Fiddle::Handle incorrectly handled certain crafted strings. An attacker could use this issue to cause a denial of service, or possibly execute arbitrary code. This issue only applied to Ubuntu 14.04 LTS. (CVE-2015-7551)

It was discovered that Ruby Net::SMTP incorrectly handled CRLF sequences. A remote attacker could possibly use this issue to inject SMTP commands. (CVE-2015-9096)

Marcin Noga discovered that Ruby incorrectly handled certain arguments in a TclTkIp class method. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 14.04 LTS. (CVE-2016-2337)

It was discovered that Ruby Fiddle::Function.new incorrectly handled certain arguments. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 14.04 LTS. (CVE-2016-2339)

It was discovered that Ruby incorrectly handled the initialization vector (IV) in GCM mode. An attacker could possibly use this issue to bypass encryption. (CVE-2016-7798)

References

Affected packages

Ubuntu:14.04:LTS / ruby1.9.1

Package

Name
ruby1.9.1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.3.484-2ubuntu1.3

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "ri1.9.1": "1.9.3.484-2ubuntu1.3",
            "libtcltk-ruby1.9.1": "1.9.3.484-2ubuntu1.3",
            "libruby1.9.1": "1.9.3.484-2ubuntu1.3",
            "ruby1.9.1-dev": "1.9.3.484-2ubuntu1.3",
            "ruby1.9.3": "1.9.3.484-2ubuntu1.3",
            "ruby1.9.1-full": "1.9.3.484-2ubuntu1.3",
            "ruby1.9.1-examples": "1.9.3.484-2ubuntu1.3",
            "ruby1.9.1": "1.9.3.484-2ubuntu1.3"
        }
    ]
}

Ubuntu:14.04:LTS / ruby2.0

Package

Name
ruby2.0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.0.484-1ubuntu2.4

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "ruby2.0-tcltk": "2.0.0.484-1ubuntu2.4",
            "ruby2.0": "2.0.0.484-1ubuntu2.4",
            "libruby2.0": "2.0.0.484-1ubuntu2.4",
            "ruby2.0-doc": "2.0.0.484-1ubuntu2.4",
            "ruby2.0-dev": "2.0.0.484-1ubuntu2.4"
        }
    ]
}

Ubuntu:16.04:LTS / ruby2.3

Package

Name
ruby2.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.1-2~16.04.2

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "ruby2.3-doc": "2.3.1-2~16.04.2",
            "ruby2.3-dev": "2.3.1-2~16.04.2",
            "ruby2.3-tcltk": "2.3.1-2~16.04.2",
            "libruby2.3": "2.3.1-2~16.04.2",
            "ruby2.3": "2.3.1-2~16.04.2"
        }
    ]
}