[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 3858-1] ruby2.7 security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3858-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Sylvain Beucler
September 02, 2024                            https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : ruby2.7
Version        : 2.7.4-1+deb11u2
CVE ID         : CVE-2021-33621 CVE-2022-28739 CVE-2023-28755 CVE-2023-28756 
                 CVE-2023-36617 CVE-2024-27280 CVE-2024-27281 CVE-2024-27282
Debian Bug     : 1009957 1024799 1038408 1067802 1069966 1069968

Several vulnerabilities have been discovered in the interpreter for
the Ruby language, which may result in denial-of-service (DoS),
information leak, and remote code execution.

CVE-2021-33621

    The cgi gem allows HTTP response splitting. This is relevant to
    applications that use untrusted user input either to generate an
    HTTP response or to create a CGI::Cookie object.

CVE-2022-28739

    Buffer over-read occurs in String-to-Float conversion, including
    Kernel#Float and String#to_f.

CVE-2023-28755

    A ReDoS issue was discovered in the URI component. The URI parser
    mishandles invalid URLs that have specific characters. It causes
    an increase in execution time for parsing strings to URI objects.

CVE-2023-28756

    A ReDoS issue was discovered in the Time component. The Time
    parser mishandles invalid URLs that have specific characters. It
    causes an increase in execution time for parsing strings to Time
    objects.

CVE-2023-36617

    Follow-up fix for CVE-2023-28755.

CVE-2024-27280

    A buffer-overread issue was discovered in StringIO. The ungetbyte
    and ungetc methods on a StringIO can read past the end of a
    string, and a subsequent call to StringIO.gets may return the
    memory value.

CVE-2024-27281

    When parsing .rdoc_options (used for configuration in RDoc) as a
    YAML file, object injection and resultant remote code execution
    are possible because there are no restrictions on the classes that
    can be restored. (When loading the documentation cache, object
    injection and resultant remote code execution are also possible if
    there were a crafted cache.)

CVE-2024-27282

    If attacker-supplied data is provided to the Ruby regex compiler,
    it is possible to extract arbitrary heap data relative to the
    start of the text, including pointers and sensitive strings.

For Debian 11 bullseye, these problems have been fixed in version
2.7.4-1+deb11u2.

We recommend that you upgrade your ruby2.7 packages.

For the detailed security status of ruby2.7 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/ruby2.7

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=vJbf
-----END PGP SIGNATURE-----


Reply to: