Skip to content

Commit 1ede1c0

Browse files
jasnowpostmodern
authored andcommitted
GHSA SYNC: 1 new advisory; 4 modified advisories
1 parent e8607af commit 1ede1c0

File tree

5 files changed

+57
-0
lines changed

5 files changed

+57
-0
lines changed

rubies/ruby/CVE-2007-5770.yml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
engine: ruby
33
cve: 2007-5770
4+
ghsa: mf83-c25g-48r6
45
url: http://www.cvedetails.com/cve/CVE-2007-5770/
56
title: Ruby Net::HTTPS library does not validate server certificate CN
67
date: 2007-10-08
@@ -15,3 +16,12 @@ cvss_v2: 4.3
1516
patched_versions:
1617
- "~> 1.8.6.230"
1718
- ">= 1.8.7"
19+
related:
20+
url:
21+
- https://nvd.nist.gov/vuln/detail/CVE-2007-5770
22+
- https://bugzilla.redhat.com/show_bug.cgi?id=362081
23+
- http://www.debian.org/security/2007/dsa-1410
24+
- http://www.debian.org/security/2007/dsa-1411
25+
- http://www.debian.org/security/2007/dsa-1412
26+
- https://ubuntu.com/security/notices/USN-596-1
27+
- https://github.com/advisories/GHSA-mf83-c25g-48r6

rubies/ruby/CVE-2009-0642.yml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
engine: ruby
33
cve: 2009-0642
4+
ghsa: 4gvm-4mw2-9fpv
45
url: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=513528
56
title: Ruby 'OCSP_basic_verify()' X.509 Certificate Verification Vulnerability
67
date: 2009-01-29
@@ -15,3 +16,12 @@ patched_versions:
1516
- "~> 1.8.7.173"
1617
- "~> 1.9.1.129"
1718
- ">= 1.9.2.preview.1"
19+
related:
20+
url:
21+
- https://nvd.nist.gov/vuln/detail/CVE-2009-0642
22+
- https://web.archive.org/web/20111209131753/http://redmine.ruby-lang.org/issues/show/1091
23+
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=513528
24+
- https://ubuntu.com/security/notices/USN-805-1
25+
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48761
26+
- https://www.invicti.com/web-application-vulnerabilities/ruby-improper-authentication-vulnerability-cve-2009-0642
27+
- https://github.com/advisories/GHSA-4gvm-4mw2-9fpv

rubies/ruby/CVE-2012-4464.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
engine: ruby
33
cve: 2012-4464
4+
ghsa: gjcp-rx5c-g849
45
url: https://www.ruby-lang.org/en/news/2012/10/12/cve-2012-4464-cve-2012-4466/
56
title: Ruby Exception#to_s / NameError#to_s Methods Safe Level Security Bypass
67
date: 2012-10-12
@@ -15,3 +16,8 @@ cvss_v2: 5.0
1516
patched_versions:
1617
- "~> 1.8.7.371"
1718
- ">= 1.9.3.286"
19+
related:
20+
url:
21+
- https://nvd.nist.gov/vuln/detail/CVE-2012-4464
22+
- https://www.ruby-lang.org/en/news/2012/10/12/cve-2012-4464-cve-2012-4466
23+
- https://github.com/advisories/GHSA-gjcp-rx5c-g849

rubies/ruby/CVE-2014-6438.yml

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
---
2+
engine: ruby
3+
cve: 2014-6438
4+
ghsa: 2j3h-55rq-rj48
5+
url: https://nvd.nist.gov/vuln/detail/CVE-2014-6438
6+
title: DoS Vulnerability associated with URI.decode_www_form_component method
7+
date: 2017-09-06
8+
description: |
9+
The URI.decode_www_form_component method in Ruby before 1.9.2-p330
10+
allows remote attackers to cause a denial of service (catastrophic
11+
regular expression backtracking, resource consumption, or application
12+
crash) via a crafted string.
13+
cvss_v2: 5.0
14+
cvss_v3: 7.5
15+
patched_versions:
16+
- ">= 1.9.2.p330"
17+
related:
18+
url:
19+
- https://nvd.nist.gov/vuln/detail/CVE-2014-6438
20+
- https://www.ruby-lang.org/en/news/2014/08/19/ruby-1-9-2-p330-released
21+
- https://github.com/ruby/www.ruby-lang.org/issues/817
22+
- http://www.openwall.com/lists/oss-security/2015/07/13/6
23+
- https://github.com/advisories/GHSA-2j3h-55rq-rj48

rubies/ruby/CVE-2022-28739.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
engine: ruby
33
cve: 2022-28739
4+
ghsa: mvgc-rxvg-hqc6
45
url: https://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/
56
title: Buffer overrun in String-to-Float conversion
67
date: 2022-04-12
@@ -10,8 +11,15 @@ description: |
1011
Due to a bug in an internal function that converts a String to a Float, some convertion methods like Kernel#Float and String#to_f could cause buffer over-read. A typical consequence is a process termination due to segmentation fault, but in a limited circumstances, it may be exploitable for illegal memory read.
1112
1213
Please update Ruby to 2.6.10, 2.7.6, 3.0.4, or 3.1.2.
14+
cvss_v2: 4.3
15+
cvss_v3: 7.5
1316
patched_versions:
1417
- "~> 2.6.10"
1518
- "~> 2.7.6"
1619
- "~> 3.0.4"
1720
- ">= 3.1.2"
21+
related:
22+
url:
23+
- https://nvd.nist.gov/vuln/detail/CVE-2022-28739
24+
- https://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739
25+
- https://github.com/advisories/GHSA-mvgc-rxvg-hqc6

0 commit comments

Comments
 (0)