|
Message-ID: <20170830170415.GA5594@suse.de> Date: Wed, 30 Aug 2017 19:04:15 +0200 From: Marcus Meissner <meissner@...e.de> To: oss-security@...ts.openwall.com Subject: Re: RubyGems flaws On Wed, Aug 30, 2017 at 10:30:19AM -0600, Kurt Seifried wrote: > Does anyone know if these got CVEs? > > https://www.ruby-lang.org/en/news/2017/08/29/multiple-vulnerabilities-in-rubygems/ > http://blog.rubygems.org/2017/08/27/2.6.13-released.html > > Security fixes: > > *Fix a DNS request hijacking vulnerability. Discovered by Jonathan > Claudius, fix by Samuel Giddins. > *Fix an ANSI escape sequence vulnerability. Discovered by Yusuke Endoh, fix > by Evan Phoenix. > *Fix a DOS vulernerability in the query command. Discovered by Yusuke > Endoh, fix by Samuel Giddins. > *Fix a vulnerability in the gem installer that allowed a malicious gem to > overwrite arbitrary files. Discovered by Yusuke Endoh, fix by Samuel > Giddins. > > Affected Versions > > *Ruby 2.2 series: 2.2.7 and earlier > *Ruby 2.3 series: 2.3.4 and earlier > *Ruby 2.4 series: 2.4.1 and earlier > *prior to trunk revision 59672 Mitre communicated to me the following CVEs on query: CVE-2017-0899 ANSI escape issue CVE-2017-0900 query command CVE-2017-0901 overwrite any file CVE-2017-0902 DNS issue Ciao, Marcus
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.