Advisories » MGASA-2017-0371

Updated ruby packages fix security vulnerabilities

Publication date: 18 Oct 2017
Modification date: 18 Oct 2017
Type: security
Affected Mageia releases : 5 , 6
CVE: CVE-2017-0898 , CVE-2017-10784 , CVE-2017-14033 , CVE-2017-14064

Description

If a malicious format string which contains a precious specifier (*) is
passed and a huge minus value is also passed to the specifier, buffer
underrun may be caused. In such situation, the result may contains heap,
or the Ruby interpreter may crash (CVE-2017-0898).

If a malicious string is passed to the decode method of OpenSSL::ASN1,
buffer underrun may be caused and the Ruby interpreter may crash
(CVE-2017-14033).

The generate method of JSON module optionally accepts an instance of
JSON::Ext::Generator::State class. If a malicious instance is passed,
the result may include contents of heap (CVE-2017-14064).

When using the Basic authentication of WEBrick, clients can pass an
arbitrary string as the user name. WEBrick outputs the passed user name
intact to its log, then an attacker can inject malicious escape
sequences to the log and dangerous control characters may be executed on
a victim’s terminal emulator (CVE-2017-10784).
                

References

SRPMS

6/core

5/core