Skip to content

Commit c547b76

Browse files
jasnowpostmodern
andauthored
6 modified ruby advisories; 2 new jruby advisories (#986)
--------- Co-authored-by: Postmodern <postmodern.mod3@gmail.com>
1 parent 1649e44 commit c547b76

File tree

8 files changed

+191
-0
lines changed

8 files changed

+191
-0
lines changed

rubies/jruby/CVE-2017-17742.yml

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
---
2+
engine: jruby
3+
cve: 2017-17742
4+
ghsa: 7p4c-jf2w-hc3w
5+
url: https://nvd.nist.gov/vuln/detail/CVE-2017-17742
6+
title: HTTP response splitting attack in WEBrick
7+
date: 2018-04-03
8+
description: |
9+
Allows an HTTP Response Splitting attack. An attacker can
10+
inject a crafted key and value into an HTTP response for
11+
the HTTP server of WEBrick.
12+
cvss_v2: 5.0
13+
cvss_v3: 5.3
14+
patched_versions:
15+
- ">= 9.2.12.0"
16+
related:
17+
url:
18+
- https://nvd.nist.gov/vuln/detail/CVE-2017-17742
19+
- https://www.jruby.org/2020/07/01/jruby-9-2-12-0.html
20+
- https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html
21+
- https://lists.debian.org/debian-lts-announce/2019/12/msg00009.html
22+
- https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html
23+
- https://github.com/advisories/GHSA-7p4c-jf2w-hc3w

rubies/jruby/CVE-2018-8778.yml

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
---
2+
engine: jruby
3+
cve: 2018-8778
4+
ghsa: wvhq-ch4h-8pwr
5+
url: https://nvd.nist.gov/vuln/detail/CVE-2018-8778
6+
title: Buffer under-read in String#unpack
7+
date: 2018-04-03
8+
description: |
9+
An attacker controlling the unpacking format (similar to format
10+
string vulnerabilities) can trigger a buffer under-read in the
11+
String#unpack method, resulting in a massive and controlled
12+
information disclosure.
13+
14+
`String#unpack` receives format specifiers as its parameter, and can be
15+
specified the position of parsing the data by the specifier `@`. If a big
16+
number is passed with `@`, the number is treated as the negative value, and
17+
out-of-buffer read is occurred. So, if a script accepts an external input as
18+
the argument of `String#unpack`, the attacker can read data on heaps.
19+
20+
All users running an affected release should upgrade immediately.
21+
cvss_v2: 5.0
22+
cvss_v3: 7.5
23+
patched_versions:
24+
- ">= 9.2.12.0"
25+
related:
26+
url:
27+
- https://nvd.nist.gov/vuln/detail/CVE-2018-8778
28+
- https://www.jruby.org/2020/07/01/jruby-9-2-12-0.html
29+
- https://github.com/advisories/GHSA-wvhq-ch4h-8pwr

rubies/ruby/CVE-2017-17742.yml

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
engine: ruby
33
cve: 2017-17742
4+
ghsa: 7p4c-jf2w-hc3w
45
url: https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/
56
title: HTTP response splitting in WEBrick
67
date: 2018-03-28
@@ -14,9 +15,31 @@ description: |
1415
to the clients.
1516
1617
All users running an affected release should upgrade immediately.
18+
cvss_v2: 5.0
19+
cvss_v3: 5.3
1720
patched_versions:
1821
- "~> 2.2.10"
1922
- "~> 2.3.7"
2023
- "~> 2.4.4"
2124
- "~> 2.5.1"
2225
- "> 2.6.0-preview1"
26+
related:
27+
url:
28+
- https://nvd.nist.gov/vuln/detail/CVE-2017-17742
29+
- https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742
30+
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released
31+
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released
32+
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released
33+
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released
34+
- https://www.ruby-lang.org/en/news/2018/05/31/ruby-2-6-0-preview2-released
35+
- https://ubuntu.com/security/notices/USN-3685-1
36+
- https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html
37+
- https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html
38+
- https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
39+
- https://www.debian.org/security/2018/dsa-4259
40+
- https://access.redhat.com/errata/RHSA-2018:3729
41+
- https://access.redhat.com/errata/RHSA-2018:3730
42+
- https://access.redhat.com/errata/RHSA-2018:3731
43+
- https://access.redhat.com/errata/RHSA-2019:2028
44+
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html
45+
- https://github.com/advisories/GHSA-7p4c-jf2w-hc3w

rubies/ruby/CVE-2018-16396.yml

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
engine: ruby
33
cve: 2018-16396
4+
ghsa: xh4x-ph6p-vmxh
45
url: https://www.ruby-lang.org/en/news/2018/10/17/not-propagated-taint-flag-in-some-formats-of-pack-cve-2018-16396/
56
title: Tainted flags not always propogated in Array#pack and String#unpack
67
date: 2018-10-17
@@ -19,8 +20,29 @@ description: |
1920
wrong.
2021
2122
All users running an affected release should upgrade immediately.
23+
cvss_v2: 6.0
24+
cvss_v3: 8.1
2225
patched_versions:
2326
- "~> 2.3.8"
2427
- "~> 2.4.5"
2528
- "~> 2.5.2"
2629
- ">= 2.6.0-preview3"
30+
related:
31+
url:
32+
- https://nvd.nist.gov/vuln/detail/CVE-2018-16396
33+
- https://www.ruby-lang.org/en/news/2018/10/17/ruby-2-3-8-released
34+
- https://www.ruby-lang.org/en/news/2018/10/17/ruby-2-4-5-released
35+
- https://www.ruby-lang.org/en/news/2018/10/17/ruby-2-5-2-released
36+
- https://www.ruby-lang.org/en/news/2018/11/06/ruby-2-6-0-preview3-released
37+
- https://www.ruby-lang.org/en/news/2018/10/17/not-propagated-taint-flag-in-some-formats-of-pack-cve-2018-16396
38+
- https://hackerone.com/reports/385070
39+
- https://ubuntu.com/security/notices/USN-3808-1
40+
- https://www.debian.org/security/2018/dsa-4332
41+
- https://lists.debian.org/debian-lts-announce/2018/10/msg00020.html
42+
- https://access.redhat.com/errata/RHSA-2018:3729
43+
- https://access.redhat.com/errata/RHSA-2018:3730
44+
- https://access.redhat.com/errata/RHSA-2018:3731
45+
- https://access.redhat.com/errata/RHSA-2019:2028
46+
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html
47+
- https://security.netapp.com/advisory/ntap-20190221-0002/
48+
- https://github.com/advisories/GHSA-xh4x-ph6p-vmxh

rubies/ruby/CVE-2018-6914.yml

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
engine: ruby
33
cve: 2018-6914
4+
ghsa: wpg3-wgm5-rv8w
45
url: https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914/
56
title: Unintentional file and directory creation with directory traversal in tempfile
67
and tmpdir
@@ -20,9 +21,31 @@ description: |
2021
any directory.
2122
2223
All users running an affected release should upgrade immediately.
24+
cvss_v2: 5.0
25+
cvss_v3: 7.5
2326
patched_versions:
2427
- "~> 2.2.10"
2528
- "~> 2.3.7"
2629
- "~> 2.4.4"
2730
- "~> 2.5.1"
2831
- "> 2.6.0-preview1"
32+
related:
33+
url:
34+
- https://nvd.nist.gov/vuln/detail/CVE-2018-6914
35+
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released
36+
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released
37+
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released
38+
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released
39+
- https://www.ruby-lang.org/en/news/2018/11/06/ruby-2-6-0-preview3-released/
40+
- https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914
41+
- https://ubuntu.com/security/notices/USN-3626-1
42+
- https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html
43+
- https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html
44+
- https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
45+
- https://www.debian.org/security/2018/dsa-4259
46+
- https://access.redhat.com/errata/RHSA-2018:3729
47+
- https://access.redhat.com/errata/RHSA-2018:3730
48+
- https://access.redhat.com/errata/RHSA-2018:3731
49+
- https://access.redhat.com/errata/RHSA-2019:2028
50+
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html
51+
- https://github.com/advisories/GHSA-wpg3-wgm5-rv8w

rubies/ruby/CVE-2018-8777.yml

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
engine: ruby
33
cve: 2018-8777
4+
ghsa: 9j6f-82h4-9mw2
45
url: https://www.ruby-lang.org/en/news/2018/03/28/large-request-dos-in-webrick-cve-2018-8777/
56
title: DoS by large request in WEBrick
67
date: 2018-03-28
@@ -13,9 +14,34 @@ description: |
1314
DoS attack.
1415
1516
All users running an affected release should upgrade immediately.
17+
cvss_v2: 5.0
18+
cvss_v3: 7.5
1619
patched_versions:
1720
- "~> 2.2.10"
1821
- "~> 2.3.7"
1922
- "~> 2.4.4"
2023
- "~> 2.5.1"
2124
- "> 2.6.0-preview1"
25+
related:
26+
url:
27+
- https://nvd.nist.gov/vuln/detail/CVE-2018-8777
28+
- https://www.ruby-lang.org/en/news/2018/03/28/large-request-dos-in-webrick-cve-2018-8777
29+
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released
30+
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released
31+
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released
32+
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released
33+
- https://www.ruby-lang.org/en/news/2018/05/31/ruby-2-6-0-preview2-released
34+
- https://usn.ubuntu.com/3685-1
35+
- https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html
36+
- https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html
37+
- https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
38+
- https://www.debian.org/security/2018/dsa-4259
39+
- https://access.redhat.com/errata/RHSA-2018:3729
40+
- https://access.redhat.com/errata/RHSA-2018:3730
41+
- https://access.redhat.com/errata/RHSA-2018:3731
42+
- https://access.redhat.com/errata/RHSA-2019:2028
43+
- https://access.redhat.com/errata/RHSA-2020:0542
44+
- https://access.redhat.com/errata/RHSA-2020:0591
45+
- https://access.redhat.com/errata/RHSA-2020:0663
46+
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html
47+
- https://github.com/advisories/GHSA-9j6f-82h4-9mw2

rubies/ruby/CVE-2018-8778.yml

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
engine: ruby
33
cve: 2018-8778
4+
ghsa: wvhq-ch4h-8pwr
45
url: https://www.ruby-lang.org/en/news/2018/03/28/buffer-under-read-unpack-cve-2018-8778/
56
title: Buffer under-read in String#unpack
67
date: 2018-03-28
@@ -12,9 +13,31 @@ description: |
1213
the argument of `String#unpack`, the attacker can read data on heaps.
1314
1415
All users running an affected release should upgrade immediately.
16+
cvss_v2: 5.0
17+
cvss_v3: 7.5
1518
patched_versions:
1619
- "~> 2.2.10"
1720
- "~> 2.3.7"
1821
- "~> 2.4.4"
1922
- "~> 2.5.1"
2023
- "> 2.6.0-preview1"
24+
related:
25+
url:
26+
- https://nvd.nist.gov/vuln/detail/CVE-2018-8778
27+
- https://www.ruby-lang.org/en/news/2018/03/28/buffer-under-read-unpack-cve-2018-8778
28+
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released
29+
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released
30+
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released
31+
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released
32+
- https://www.ruby-lang.org/en/news/2018/11/06/ruby-2-6-0-preview3-released
33+
- https://ubuntu.com/security/notices/USN-3626-1
34+
- https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html
35+
- https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html
36+
- https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
37+
- https://www.debian.org/security/2018/dsa-4259
38+
- https://access.redhat.com/errata/RHSA-2018:3729
39+
- https://access.redhat.com/errata/RHSA-2018:3730
40+
- https://access.redhat.com/errata/RHSA-2018:3731
41+
- https://access.redhat.com/errata/RHSA-2019:2028
42+
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html
43+
- https://github.com/advisories/GHSA-wvhq-ch4h-8pwr

rubies/ruby/CVE-2018-8779.yml

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,31 @@ description: |
2020
path.
2121
2222
All users running an affected release should upgrade immediately.
23+
cvss_v2: 5.0
24+
cvss_v3: 7.5
2325
patched_versions:
2426
- "~> 2.2.10"
2527
- "~> 2.3.7"
2628
- "~> 2.4.4"
2729
- "~> 2.5.1"
2830
- "> 2.6.0-preview1"
31+
related:
32+
url:
33+
- https://nvd.nist.gov/vuln/detail/CVE-2018-8779
34+
- https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-unixsocket-cve-2018-8779
35+
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released
36+
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released
37+
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released
38+
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released
39+
- https://www.ruby-lang.org/en/news/2018/05/31/ruby-2-6-0-preview2-released
40+
- https://ubuntu.com/security/notices/USN-3626-1
41+
- https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html
42+
- https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html
43+
- https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
44+
- https://www.debian.org/security/2018/dsa-4259
45+
- https://access.redhat.com/errata/RHSA-2018:3729
46+
- https://access.redhat.com/errata/RHSA-2018:3730
47+
- https://access.redhat.com/errata/RHSA-2018:3731
48+
- https://access.redhat.com/errata/RHSA-2019:2028
49+
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html
50+
- https://github.com/advisories/GHSA-mwq4-948j-88c5

0 commit comments

Comments
 (0)