Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 30 Aug 2017 19:04:15 +0200
From: Marcus Meissner <meissner@...e.de>
To: oss-security@...ts.openwall.com
Subject: Re: RubyGems flaws

On Wed, Aug 30, 2017 at 10:30:19AM -0600, Kurt Seifried wrote:
> Does anyone know if these got CVEs?
> 
> https://www.ruby-lang.org/en/news/2017/08/29/multiple-vulnerabilities-in-rubygems/
> http://blog.rubygems.org/2017/08/27/2.6.13-released.html
> 
> Security fixes:
> 
> *Fix a DNS request hijacking vulnerability. Discovered by Jonathan
> Claudius, fix by Samuel Giddins.
> *Fix an ANSI escape sequence vulnerability. Discovered by Yusuke Endoh, fix
> by Evan Phoenix.
> *Fix a DOS vulernerability in the query command. Discovered by Yusuke
> Endoh, fix by Samuel Giddins.
> *Fix a vulnerability in the gem installer that allowed a malicious gem to
> overwrite arbitrary files. Discovered by Yusuke Endoh, fix by Samuel
> Giddins.
> 
> Affected Versions
> 
> *Ruby 2.2 series: 2.2.7 and earlier
> *Ruby 2.3 series: 2.3.4 and earlier
> *Ruby 2.4 series: 2.4.1 and earlier
> *prior to trunk revision 59672

Mitre communicated to me the following CVEs on query:

CVE-2017-0899  ANSI escape issue

CVE-2017-0900  query command

CVE-2017-0901  overwrite any file

CVE-2017-0902  DNS issue

Ciao, Marcus

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ