Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <53BB9A66.6080201@redhat.com>
Date: Tue, 08 Jul 2014 17:14:46 +1000
From: Murray McAllister <mmcallis@...hat.com>
To: oss-security@...ts.openwall.com
CC: moses@...petlabs.com, security@...y-lang.org
Subject: possible CVE-2010 request: Ruby older than 1.9.2 appending current
 directory to the load path

Good morning,

CVE-2014-3248 (http://puppetlabs.com/security/cve/cve-2014-3248)
describes the following:

"On platforms with Ruby 1.9.1 or earlier, an attacker could have Puppet
execute malicious code by convincing a privileged user to change
directories to one containing the malicious code and then run Puppet."

The issue in Ruby was fixed here:

https://www.ruby-lang.org/en/news/2010/08/18/ruby-1-9.2-released/

The "$: doesn't include the current direcotry." entry, I guess.

Is a 2010 CVE ID needed for this, or should it only be treated as hardening?

Thanks,

--
Murray McAllister / Red Hat Product Security

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.