{"id":"MGASA-2017-0290","summary":"Updated ruby packages fix security vulnerabilities","details":"It was discovered that Ruby Net::SMTP incorrectly handled CRLF\nsequences. A remote attacker could possibly use this issue to inject\nSMTP commands. (CVE-2015-9096)\n\nMarcin Noga discovered that Ruby incorrectly handled certain arguments\nin a TclTkIp class method. An attacker could possibly use this issue to\nexecute arbitrary code. This issue only affected Ubuntu 14.04 LTS.\n(CVE-2016-2337)\n\nIt was discovered that Ruby Fiddle::Function.new incorrectly handled\ncertain arguments. An attacker could possibly use this issue to execute\narbitrary code. This issue only affected Ubuntu 14.04 LTS.\n(CVE-2016-2339)\n","modified":"2026-04-16T06:26:07.384912092Z","published":"2017-08-20T09:10:44Z","upstream":["CVE-2015-9096","CVE-2016-2337","CVE-2016-2339"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2017-0290.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=20625"},{"type":"WEB","url":"https://usn.ubuntu.com/usn/usn-3365-1/"}],"affected":[{"package":{"name":"ruby","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/ruby?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.0.p648-1.4.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0290.json"}},{"package":{"name":"ruby","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/ruby?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.7-1.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0290.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}