Gentoo Archives: gentoo-announce

From: Thomas Deutschmann <whissi@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 201802-05 ] Ruby: Command injection
Date: Tue, 20 Feb 2018 01:02:34
Message-Id: 7e5c9e03-b184-d159-33b2-af2de86f67b1@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201802-05
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Ruby: Command injection
9 Date: February 20, 2018
10 Bugs: #641090
11 ID: 201802-05
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A vulnerability has been found in Ruby which may allow for arbitrary
19 command execution.
20
21 Background
22 ==========
23
24 Ruby is an interpreted object-oriented programming language. The
25 elaborate standard library includes an HTTP server (“WEBRick”) and a
26 class for XML parsing (“REXML”).
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 dev-lang/ruby < 2.2.9:2.2 >= 2.2.9:2.2
35
36 Description
37 ===========
38
39 A command injection flaw was discovered in Net::FTP which impacts Ruby.
40
41 Impact
42 ======
43
44 A remote attacker, by enticing a user to download and open a crafted
45 file from a malicious FTP server, could execute arbitrary commands with
46 the privileges of the process.
47
48 Workaround
49 ==========
50
51 There is no known workaround at this time.
52
53 Resolution
54 ==========
55
56 All Ruby users should upgrade to the latest version:
57
58 # emerge --sync
59 # emerge --ask --oneshot --verbose ">=dev-lang/ruby-2.2.9:2.2"
60
61 References
62 ==========
63
64 [ 1 ] CVE-2017-17405
65 https://nvd.nist.gov/vuln/detail/CVE-2017-17405
66
67 Availability
68 ============
69
70 This GLSA and any updates to it are available for viewing at
71 the Gentoo Security Website:
72
73 https://security.gentoo.org/glsa/201802-05
74
75 Concerns?
76 =========
77
78 Security is a primary focus of Gentoo Linux and ensuring the
79 confidentiality and security of our users' machines is of utmost
80 importance to us. Any security concerns should be addressed to
81 security@g.o or alternatively, you may file a bug at
82 https://bugs.gentoo.org.
83
84 License
85 =======
86
87 Copyright 2018 Gentoo Foundation, Inc; referenced text
88 belongs to its owner(s).
89
90 The contents of this document are licensed under the
91 Creative Commons - Attribution / Share Alike license.
92
93 https://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature