Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 30 Aug 2017 19:04:15 +0200
From: Marcus Meissner <meissner@...e.de>
To: oss-security@...ts.openwall.com
Subject: Re: RubyGems flaws

On Wed, Aug 30, 2017 at 10:30:19AM -0600, Kurt Seifried wrote:
> Does anyone know if these got CVEs?
> 
> https://www.ruby-lang.org/en/news/2017/08/29/multiple-vulnerabilities-in-rubygems/
> http://blog.rubygems.org/2017/08/27/2.6.13-released.html
> 
> Security fixes:
> 
> *Fix a DNS request hijacking vulnerability. Discovered by Jonathan
> Claudius, fix by Samuel Giddins.
> *Fix an ANSI escape sequence vulnerability. Discovered by Yusuke Endoh, fix
> by Evan Phoenix.
> *Fix a DOS vulernerability in the query command. Discovered by Yusuke
> Endoh, fix by Samuel Giddins.
> *Fix a vulnerability in the gem installer that allowed a malicious gem to
> overwrite arbitrary files. Discovered by Yusuke Endoh, fix by Samuel
> Giddins.
> 
> Affected Versions
> 
> *Ruby 2.2 series: 2.2.7 and earlier
> *Ruby 2.3 series: 2.3.4 and earlier
> *Ruby 2.4 series: 2.4.1 and earlier
> *prior to trunk revision 59672

Mitre communicated to me the following CVEs on query:

CVE-2017-0899  ANSI escape issue

CVE-2017-0900  query command

CVE-2017-0901  overwrite any file

CVE-2017-0902  DNS issue

Ciao, Marcus

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.