Skip to content

Commit 9426975

Browse files
committed
GHSA SYNC: 2 modified and 2 new advisories
1 parent f8ab84e commit 9426975

File tree

4 files changed

+99
-6
lines changed

4 files changed

+99
-6
lines changed

rubies/ruby/CVE-2006-1931.yml

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
---
2+
engine: ruby
3+
cve: 2006-1931
4+
osvdb: 24972
5+
ghsa: j98g-25wq-62h9
6+
url: https://nvd.nist.gov/vuln/detail/CVE-2006-1931
7+
title: Ruby http/xmlrpc server DoS
8+
date: 2006-04-20
9+
description: |
10+
The HTTP/XMLRPC server in Ruby before 1.8.2 uses blocking sockets,
11+
which allows attackers to cause a denial of service
12+
(blocked connections) via a large amount of data.
13+
cvss_v2: 5.0
14+
patched_versions:
15+
- ">= 1.8.3"
16+
related:
17+
url:
18+
- https://nvd.nist.gov/vuln/detail/CVE-2006-1931
19+
- https://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.2-xmlrpc-dos-1.patch
20+
- https://security.gentoo.org/glsa/200605-11
21+
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26102
22+
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189540
23+
- https://web.archive.org/web/20201208004659/https://usn.ubuntu.com/273-1
24+
- https://web.archive.org/web/20070430022104/http://www.debian.org/security/2006/dsa-1157
25+
- https://web.archive.org/web/20061128124605/http://blade.nagaokaut.ac.jp/cgi-bin/scat.rb/ruby/ruby-dev/27787
26+
- https://github.com/advisories/GHSA-j98g-25wq-62h9

rubies/ruby/CVE-2009-5147.yml

Lines changed: 17 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,28 @@
11
---
22
engine: ruby
33
cve: 2009-5147
4-
url: https://www.ruby-lang.org/en/news/2009/05/12/ruby-1-9-1-p129-released/
5-
title: Ruby DL::dlopen could open a library with tainted library name even if $SAFE
6-
> 0
4+
ghsa: mmq8-m72q-qgm4
5+
url: https://nvd.nist.gov/vuln/detail/CVE-2009-5147
6+
title: Ruby DL::dlopen could open a library with tainted library
7+
name even if $SAFE > 0
78
date: 2009-05-12
89
description: |
910
DL::dlopen could open a library with tainted library name even if $SAFE > 0
11+
cvss_v2: 7.5
12+
cvss_v3: 7.3
1013
unaffected_versions:
1114
- "< 1.9.1"
1215
- ">= 1.9.2"
1316
patched_versions:
1417
- "~> 1.9.1.129"
18+
related:
19+
url:
20+
- https://nvd.nist.gov/vuln/detail/CVE-2009-5147
21+
- https://www.ruby-lang.org/en/news/2009/05/12/ruby-1-9-1-p129-released
22+
- https://github.com/ruby/ruby/commit/4600cf725a86ce31266153647ae5aa1197b1215b
23+
- https://github.com/ruby/ruby/commit/7269e3de3cee3bbb6ab77fc708f3a10cab00b65e
24+
- http://seclists.org/oss-sec/2015/q3/222
25+
- https://bugzilla.redhat.com/show_bug.cgi?id=1248935
26+
- https://access.redhat.com/errata/RHSA-2018:0583
27+
- https://github.com/advisories?query=GHSA-mmq8-m72q-qgm4
28+
- https://web.archive.org/web/20200227161903/https://www.securityfocus.com/bid/76060

rubies/ruby/CVE-2015-7551.yml

Lines changed: 19 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,8 @@
11
---
22
engine: ruby
33
cve: 2015-7551
4-
url: https://www.ruby-lang.org/en/news/2015/12/16/unsafe-tainted-string-usage-in-fiddle-and-dl-cve-2015-7551/
4+
ghsa: m9xr-x5mq-4fp5
5+
url: https://nvd.nist.gov/vuln/detail/CVE-2015-7551
56
title: Unsafe tainted string usage in Fiddle and DL
67
date: 2015-12-16
78
description: |
@@ -10,10 +11,25 @@ description: |
1011
was reimplemented using Fiddle and libffi.
1112
And, about DL, CVE-2009-5147 was fixed at Ruby 1.9.1, but not fixed at other
1213
branches, then rubies which bundled DL except Ruby 1.9.1 are still vulnerable.
14+
cvss_v2: 4.6
15+
cvss_v3: 8.4
16+
unaffected_versions:
17+
- "~> 1.9.1.129"
1318
patched_versions:
1419
- "~> 2.0.0.648"
1520
- "~> 2.1.8"
1621
- "~> 2.2.4"
1722
- ">= 2.3.0"
18-
unaffected_versions:
19-
- "~> 1.9.1.129"
23+
related:
24+
url:
25+
- https://nvd.nist.gov/vuln/detail/CVE-2015-7551
26+
- https://www.ruby-lang.org/en/news/2015/12/16/unsafe-tainted-string-usage-in-fiddle-and-dl-cve-2015-7551
27+
- https://github.com/ruby/ruby/commit/339e11a7f178312d937b7c95dd3115ce7236597a
28+
- https://ubuntu.com/security/CVE-2015-7551
29+
- https://access.redhat.com/errata/RHSA-2018:0583
30+
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796344
31+
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796551
32+
- https://www.oracle.com/security-alerts/bulletinapr2016.html
33+
- https://web.archive.org/web/20161001113255/http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
34+
- https://web.archive.org/web/20181112082809/https://puppet.com/security/cve/ruby-dec-2015-security-fixes
35+
- https://github.com/advisories/GHSA-m9xr-x5mq-4fp5

rubies/ruby/CVE-2021-32066.yml

Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
---
2+
engine: ruby
3+
cve: 2021-32066
4+
ghsa: gx49-h5r3-q3xj
5+
url: https://nvd.nist.gov/vuln/detail/CVE-2021-32066
6+
title: imap - StartTLS stripping attack
7+
date: 2021-08-01
8+
description: |
9+
An issue was discovered in Ruby through
10+
2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1.
11+
Net::IMAP does not raise an exception when StartTLS fails with
12+
an an unknown response, which might allow man-in-the-middle
13+
attackers to bypass the TLS protections by leveraging a network
14+
position between the client and the registry to block the
15+
StartTLS command, aka a "StartTLS stripping attack."
16+
cvss_v2: 5.8
17+
cvss_v3: 7.4
18+
patched_versions:
19+
- "~> 2.6.8"
20+
- "~> 2.7.4"
21+
- ">= 3.0.2"
22+
related:
23+
url:
24+
- https://nvd.nist.gov/vuln/detail/CVE-2021-32066
25+
- https://www.ruby-lang.org/en/news/2021/07/07/ruby-3-0-2-released
26+
- https://www.ruby-lang.org/en/news/2021/07/07/ruby-2-7-4-released
27+
- https://www.ruby-lang.org/en/news/2021/07/07/ruby-2-6-8-released
28+
- https://www.ruby-lang.org/en/news/2021/07/07/starttls-stripping-in-net-imap
29+
- https://github.com/ruby/ruby/commit/a21a3b7d23704a01d34bd79d09dc37897e00922a
30+
- https://hackerone.com/reports/1178562
31+
- https://osv.dev/vulnerability/BIT-ruby-2021-32066?utm_source=copilot.com
32+
- https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html
33+
- https://lists.debian.org/debian-lts-announce/2021/10/msg00009.html
34+
- https://www.oracle.com/security-alerts/cpuapr2022.html
35+
- https://security.netapp.com/advisory/ntap-20210902-0004
36+
- https://security.gentoo.org/glsa/202401-27
37+
- https://github.com/advisories/GHSA-gx49-h5r3-q3xj

0 commit comments

Comments
 (0)