Debian Security Advisory

DLA-1114-1 ruby1.9.1 -- LTS security update

Date Reported:
26 Sep 2017
Affected Packages:
ruby1.9.1
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 873802, Bug 873906, Bug 875928, Bug 875931, Bug 875936.
In Mitre's CVE dictionary: CVE-2017-0898, CVE-2017-0899, CVE-2017-0900, CVE-2017-0901, CVE-2017-10784, CVE-2017-14033, CVE-2017-14064.
More information:

Multiple vulnerabilities were discovered in the Ruby 1.9 interpretor.

  • CVE-2017-0898

    Buffer underrun vulnerability in Kernel.sprintf

  • CVE-2017-0899

    ANSI escape sequence vulnerability

  • CVE-2017-0900

    DOS vulernerability in the query command

  • CVE-2017-0901

    gem installer allows a malicious gem to overwrite arbitrary files

  • CVE-2017-10784

    Escape sequence injection vulnerability in the Basic authentication of WEBrick

  • CVE-2017-14033

    Buffer underrun vulnerability in OpenSSL ASN1 decode

  • CVE-2017-14064

    Heap exposure vulnerability in generating JSON

For Debian 7 Wheezy, these problems have been fixed in version 1.9.3.194-8.1+deb7u6.

We recommend that you upgrade your ruby1.9.1 packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS