A vulnerability has been found in Ruby which may allow for arbitrary command execution.
Package | dev-lang/ruby on all architectures |
---|---|
Affected versions | < 2.2.9 |
Unaffected versions | >= 2.2.9 |
Ruby is an interpreted object-oriented programming language. The elaborate standard library includes an HTTP server (“WEBRick”) and a class for XML parsing (“REXML”).
A command injection flaw was discovered in Net::FTP which impacts Ruby.
A remote attacker, by enticing a user to download and open a crafted file from a malicious FTP server, could execute arbitrary commands with the privileges of the process.
There is no known workaround at this time.
All Ruby users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/ruby-2.2.9:2.2"
Release date
February 20, 2018
Latest revision
February 20, 2018: 1
Severity
normal
Exploitable
remote
Bugzilla entries