Summary: | <dev-lang/ruby-2.2.9: Command injection vulnerability in Net::FTP (CVE-2017-17405) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Hans de Graaff <graaff> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | ruby |
Priority: | Normal | Flags: | stable-bot:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://www.ruby-lang.org/en/news/2017/12/14/net-ftp-command-injection-cve-2017-17405/ | ||
Whiteboard: | B2 [glsa+ cve] | ||
Package list: |
dev-lang/ruby-2.2.9
|
Runtime testing required: | --- |
Description
Hans de Graaff
2017-12-15 07:29:07 UTC
Fixed versions are available: dev-lang/ruby-2.2.9 dev-lang/ruby-2.3.6 dev-lang/ruby-2.4.3 Since 2.2.9 only contains the single fix to Net::FTP we can proceed with stabling right away. hppa stable sparc stable (thanks to Rolf Eike Beer) amd64 stable arm stable ia64 stable ppc/ppc64 stable x86 stable alpha stable vulnerable versions have been removed GLSA request filed. This issue was resolved and addressed in GLSA 201802-05 at https://security.gentoo.org/glsa/201802-05 by GLSA coordinator Thomas Deutschmann (whissi). |