ALT-BU-2018-3077-1
Branch c7.1 update bulletin.
Closed bugs
Добавить дополнительные параметры к макросу cmake
Собрать версию > 3.0
Зависит от gnustep-Backbone
Closed vulnerabilities
BDU:2016-00903
Уязвимость интерпретатора Ruby, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2017-02182
Уязвимость интерпретатора Ruby, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-02342
Уязвимость функции аутентификации библиотеки WEBrick, позволяющая нарушителю выполнить произвольные команды
BDU:2018-00026
Уязвимость менеджера пакетов rubygems, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю осуществить перезапись любого файла
BDU:2019-00512
Уязвимость реализации команд Net::FTP интерпретатора языка программирования Ruby, позволяющая нарушителю выполнить произвольные команды
Modified: 2024-11-21
CVE-2009-5147
DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names.
- [oss-security] 20150728 Re: CVE request: Two ruby 'dl' vulnerabilities fixed in ruby-1.9.1-p129
- [oss-security] 20150728 Re: CVE request: Two ruby 'dl' vulnerabilities fixed in ruby-1.9.1-p129
- 76060
- 76060
- RHSA-2018:0583
- RHSA-2018:0583
- https://bugzilla.redhat.com/show_bug.cgi?id=1248935
- https://bugzilla.redhat.com/show_bug.cgi?id=1248935
- https://github.com/ruby/ruby/commit/4600cf725a86ce31266153647ae5aa1197b1215b
- https://github.com/ruby/ruby/commit/4600cf725a86ce31266153647ae5aa1197b1215b
- https://www.ruby-lang.org/en/news/2015/12/16/unsafe-tainted-string-usage-in-fiddle-and-dl-cve-2015-7551/
- https://www.ruby-lang.org/en/news/2015/12/16/unsafe-tainted-string-usage-in-fiddle-and-dl-cve-2015-7551/
Modified: 2024-11-21
CVE-2012-4464
Ruby 1.9.3 before patchlevel 286 and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the (1) exc_to_s or (2) name_err_to_s API function, which marks the string as tainted, a different vulnerability than CVE-2012-4466. NOTE: this issue might exist because of a CVE-2011-1005 regression.
- FEDORA-2012-15376
- FEDORA-2012-15376
- FEDORA-2012-15395
- FEDORA-2012-15395
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068
- [oss-security] 20121002 CVE Request: Ruby safe level bypasses
- [oss-security] 20121002 CVE Request: Ruby safe level bypasses
- [oss-security] 20121003 Re: CVE Request: Ruby safe level bypasses
- [oss-security] 20121003 Re: CVE Request: Ruby safe level bypasses
- http://www.ruby-lang.org/en/news/2012/10/12/cve-2012-4464-cve-2012-4466/
- http://www.ruby-lang.org/en/news/2012/10/12/cve-2012-4464-cve-2012-4466/
- https://bugzilla.redhat.com/show_bug.cgi?id=862598
- https://bugzilla.redhat.com/show_bug.cgi?id=862598
Modified: 2024-11-21
CVE-2012-4466
Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005.
- FEDORA-2012-15376
- FEDORA-2012-15376
- FEDORA-2012-15395
- FEDORA-2012-15395
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068
- MDVSA-2013:124
- MDVSA-2013:124
- [oss-security] 20121002 CVE Request: Ruby safe level bypasses
- [oss-security] 20121002 CVE Request: Ruby safe level bypasses
- [oss-security] 20121003 Re: CVE Request: Ruby safe level bypasses
- [oss-security] 20121003 Re: CVE Request: Ruby safe level bypasses
- http://www.ruby-lang.org/en/news/2012/10/12/cve-2012-4464-cve-2012-4466/
- http://www.ruby-lang.org/en/news/2012/10/12/cve-2012-4464-cve-2012-4466/
- https://bugzilla.redhat.com/show_bug.cgi?id=862614
- https://bugzilla.redhat.com/show_bug.cgi?id=862614
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0294
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0294
Modified: 2024-11-21
CVE-2012-4522
The rb_get_path_check function in file.c in Ruby 1.9.3 before patchlevel 286 and Ruby 2.0.0 before r37163 allows context-dependent attackers to create files in unexpected locations or with unexpected names via a NUL byte in a file path.
- FEDORA-2012-16071
- FEDORA-2012-16071
- FEDORA-2012-16086
- FEDORA-2012-16086
- RHSA-2013:0129
- RHSA-2013:0129
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37163
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37163
- [oss-security] 20121012 CVE request: ruby file creation due in insertion of illegal NUL character
- [oss-security] 20121012 CVE request: ruby file creation due in insertion of illegal NUL character
- [oss-security] 20121013 Re: CVE request: ruby file creation due in insertion of illegal NUL character
- [oss-security] 20121013 Re: CVE request: ruby file creation due in insertion of illegal NUL character
- [oss-security] 20121016 Re: CVE request: ruby file creation due in insertion of illegal NUL character
- [oss-security] 20121016 Re: CVE request: ruby file creation due in insertion of illegal NUL character
- http://www.ruby-lang.org/en/news/2012/10/12/poisoned-NUL-byte-vulnerability/
- http://www.ruby-lang.org/en/news/2012/10/12/poisoned-NUL-byte-vulnerability/
Modified: 2024-11-21
CVE-2012-5371
Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.
- http://2012.appsec-forum.ch/conferences/#c17
- http://2012.appsec-forum.ch/conferences/#c17
- http://asfws12.files.wordpress.com/2012/11/asfws2012-jean_philippe_aumasson-martin_bosslet-hash_flooding_dos_reloaded.pdf
- http://asfws12.files.wordpress.com/2012/11/asfws2012-jean_philippe_aumasson-martin_bosslet-hash_flooding_dos_reloaded.pdf
- 51253
- 51253
- 1027747
- 1027747
- http://www.ocert.org/advisories/ocert-2012-001.html
- http://www.ocert.org/advisories/ocert-2012-001.html
- 87280
- 87280
- http://www.ruby-lang.org/en/news/2012/11/09/ruby19-hashdos-cve-2012-5371/
- http://www.ruby-lang.org/en/news/2012/11/09/ruby19-hashdos-cve-2012-5371/
- 56484
- 56484
- USN-1733-1
- USN-1733-1
- https://bugzilla.redhat.com/show_bug.cgi?id=875236
- https://bugzilla.redhat.com/show_bug.cgi?id=875236
- ruby-hash-function-dos(79993)
- ruby-hash-function-dos(79993)
- https://www.131002.net/data/talks/appsec12_slides.pdf
- https://www.131002.net/data/talks/appsec12_slides.pdf
Modified: 2024-11-21
CVE-2012-5380
Untrusted search path vulnerability in the installation functionality in Ruby 1.9.3-p194, when installed in the top-level C:\ directory, might allow local users to gain privileges via a Trojan horse DLL in the C:\Ruby193\bin directory, which may be added to the PATH system environment variable by an administrator, as demonstrated by a Trojan horse wlbsctrl.dll file used by the "IKE and AuthIP IPsec Keying Modules" system service in Windows Vista SP1, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 Release Preview. NOTE: CVE disputes this issue because the unsafe PATH is established only by a separate administrative action that is not a default part of the Ruby installation
Modified: 2024-11-21
CVE-2013-0256
darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.
- http://blog.segment7.net/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2
- http://blog.segment7.net/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2
- SUSE-SU-2013:0647
- SUSE-SU-2013:0647
- openSUSE-SU-2013:0303
- openSUSE-SU-2013:0303
- RHSA-2013:0548
- RHSA-2013:0548
- RHSA-2013:0686
- RHSA-2013:0686
- RHSA-2013:0701
- RHSA-2013:0701
- RHSA-2013:0728
- RHSA-2013:0728
- 52774
- 52774
- http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256/
- http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256/
- USN-1733-1
- USN-1733-1
- https://bugzilla.redhat.com/show_bug.cgi?id=907820
- https://bugzilla.redhat.com/show_bug.cgi?id=907820
- https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60
- https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60
Modified: 2024-11-21
CVE-2013-1821
lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525
- SUSE-SU-2013:0609
- SUSE-SU-2013:0609
- SUSE-SU-2013:0647
- SUSE-SU-2013:0647
- openSUSE-SU-2013:0603
- openSUSE-SU-2013:0603
- openSUSE-SU-2013:0614
- openSUSE-SU-2013:0614
- RHSA-2013:0611
- RHSA-2013:0611
- RHSA-2013:0612
- RHSA-2013:0612
- RHSA-2013:1028
- RHSA-2013:1028
- RHSA-2013:1147
- RHSA-2013:1147
- 52783
- 52783
- 52902
- 52902
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=39384
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=39384
- DSA-2738
- DSA-2738
- DSA-2809
- DSA-2809
- MDVSA-2013:124
- MDVSA-2013:124
- [oss-security] 20130306 CVE for Ruby Entity expansion DoS vulnerability in REXML (XML bomb)
- [oss-security] 20130306 CVE for Ruby Entity expansion DoS vulnerability in REXML (XML bomb)
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/
- http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/
- 58141
- 58141
- SSA:2013-075-01
- SSA:2013-075-01
- USN-1780-1
- USN-1780-1
- https://bugzilla.redhat.com/show_bug.cgi?id=914716
- https://bugzilla.redhat.com/show_bug.cgi?id=914716
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092
Modified: 2024-11-21
CVE-2013-2065
(1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native functions, which allows context-dependent attackers to bypass intended $SAFE level restrictions.
- FEDORA-2013-8411
- FEDORA-2013-8411
- FEDORA-2013-8375
- FEDORA-2013-8375
- FEDORA-2013-8738
- FEDORA-2013-8738
- openSUSE-SU-2013:1611
- openSUSE-SU-2013:1611
- USN-2035-1
- USN-2035-1
- https://puppet.com/security/cve/cve-2013-2065
- https://puppet.com/security/cve/cve-2013-2065
- https://www.ruby-lang.org/en/news/2013/05/14/taint-bypass-dl-fiddle-cve-2013-2065/
- https://www.ruby-lang.org/en/news/2013/05/14/taint-bypass-dl-fiddle-cve-2013-2065/
Modified: 2024-11-21
CVE-2013-4073
The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
- http://forums.interworx.com/threads/8000-InterWorx-Version-5-0-14-Released-on-Beta-Channel%21
- http://forums.interworx.com/threads/8000-InterWorx-Version-5-0-14-Released-on-Beta-Channel%21
- APPLE-SA-2013-10-22-3
- APPLE-SA-2013-10-22-3
- openSUSE-SU-2013:1181
- openSUSE-SU-2013:1181
- openSUSE-SU-2013:1186
- openSUSE-SU-2013:1186
- RHSA-2013:1090
- RHSA-2013:1090
- RHSA-2013:1103
- RHSA-2013:1103
- RHSA-2013:1137
- RHSA-2013:1137
- http://support.apple.com/kb/HT6150
- http://support.apple.com/kb/HT6150
- DSA-2738
- DSA-2738
- DSA-2809
- DSA-2809
- http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/
- http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/
- USN-1902-1
- USN-1902-1
- https://bugzilla.redhat.com/show_bug.cgi?id=979251
- https://bugzilla.redhat.com/show_bug.cgi?id=979251
- https://puppet.com/security/cve/cve-2013-4073
- https://puppet.com/security/cve/cve-2013-4073
Modified: 2024-11-21
CVE-2013-4164
Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the to_f method or (2) JSON.parse.
- APPLE-SA-2014-04-22-1
- APPLE-SA-2014-04-22-1
- APPLE-SA-2014-10-16-3
- APPLE-SA-2014-10-16-3
- SUSE-SU-2013:1897
- SUSE-SU-2013:1897
- openSUSE-SU-2013:1834
- openSUSE-SU-2013:1834
- openSUSE-SU-2013:1835
- openSUSE-SU-2013:1835
- 100113
- 100113
- RHSA-2013:1763
- RHSA-2013:1763
- RHSA-2013:1764
- RHSA-2013:1764
- RHSA-2013:1767
- RHSA-2013:1767
- RHSA-2014:0011
- RHSA-2014:0011
- RHSA-2014:0215
- RHSA-2014:0215
- 55787
- 55787
- 57376
- 57376
- DSA-2809
- DSA-2809
- DSA-2810
- DSA-2810
- 63873
- 63873
- USN-2035-1
- USN-2035-1
- https://puppet.com/security/cve/cve-2013-4164
- https://puppet.com/security/cve/cve-2013-4164
- https://support.apple.com/kb/HT6536
- https://support.apple.com/kb/HT6536
- https://www.ruby-lang.org/en/news/2013/11/22/heap-overflow-in-floating-point-parsing-cve-2013-4164
- https://www.ruby-lang.org/en/news/2013/11/22/heap-overflow-in-floating-point-parsing-cve-2013-4164
- https://www.ruby-lang.org/en/news/2013/11/22/ruby-1-9-3-p484-is-released
- https://www.ruby-lang.org/en/news/2013/11/22/ruby-1-9-3-p484-is-released
- https://www.ruby-lang.org/en/news/2013/11/22/ruby-2-0-0-p353-is-released
- https://www.ruby-lang.org/en/news/2013/11/22/ruby-2-0-0-p353-is-released
Modified: 2024-11-21
CVE-2013-4287
Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.1, 1.8.24 through 1.8.25, 2.0.x before 2.0.8, and 2.1.x before 2.1.0, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression.
- http://blog.rubygems.org/2013/09/09/CVE-2013-4287.html
- http://blog.rubygems.org/2013/09/09/CVE-2013-4287.html
- RHSA-2013:1427
- RHSA-2013:1427
- RHSA-2013:1441
- RHSA-2013:1441
- RHSA-2013:1523
- RHSA-2013:1523
- RHSA-2013:1852
- RHSA-2013:1852
- RHSA-2014:0207
- RHSA-2014:0207
- 55381
- 55381
- [oss-security] 20130909 CVE-2013-4287 Algorithmic complexity vulnerability in RubyGems 2.0.7 and older
- [oss-security] 20130909 CVE-2013-4287 Algorithmic complexity vulnerability in RubyGems 2.0.7 and older
- https://puppet.com/security/cve/cve-2013-4287
- https://puppet.com/security/cve/cve-2013-4287
Modified: 2024-11-21
CVE-2013-4363
Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.2, 1.8.24 through 1.8.26, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression. NOTE: this issue is due to an incomplete fix for CVE-2013-4287.
- http://blog.rubygems.org/2013/09/24/CVE-2013-4363.html
- http://blog.rubygems.org/2013/09/24/CVE-2013-4363.html
- [oss-security] 20130915 Re: CVE-2013-4287 Algorithmic complexity vulnerability in RubyGems 2.0.7 and older
- [oss-security] 20130915 Re: CVE-2013-4287 Algorithmic complexity vulnerability in RubyGems 2.0.7 and older
- [oss-security] 20130918 Re: CVE-2013-4287 Algorithmic complexity vulnerability in RubyGems 2.0.7 and older
- [oss-security] 20130918 Re: CVE-2013-4287 Algorithmic complexity vulnerability in RubyGems 2.0.7 and older
- [oss-security] 20130920 Re: CVE-2013-4287 Algorithmic complexity vulnerability in RubyGems 2.0.7 and older
- [oss-security] 20130920 Re: CVE-2013-4287 Algorithmic complexity vulnerability in RubyGems 2.0.7 and older
- https://puppet.com/security/cve/cve-2013-4363
- https://puppet.com/security/cve/cve-2013-4363
Modified: 2024-11-21
CVE-2014-4975
Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.
- http://advisories.mageia.org/MGASA-2014-0472.html
- http://advisories.mageia.org/MGASA-2014-0472.html
- RHSA-2014:1912
- RHSA-2014:1912
- RHSA-2014:1913
- RHSA-2014:1913
- RHSA-2014:1914
- RHSA-2014:1914
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=46778
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=46778
- DSA-3157
- DSA-3157
- MDVSA-2015:129
- MDVSA-2015:129
- [oss-security] 20140709 Fwd: [ruby-core:63604] [ruby-trunk - Bug #10019] [Open] segmentation fault/buffer overrun in pack.c (encodes)
- [oss-security] 20140709 Fwd: [ruby-core:63604] [ruby-trunk - Bug #10019] [Open] segmentation fault/buffer overrun in pack.c (encodes)
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 68474
- 68474
- USN-2397-1
- USN-2397-1
- https://bugs.ruby-lang.org/issues/10019
- https://bugs.ruby-lang.org/issues/10019
- https://bugzilla.redhat.com/show_bug.cgi?id=1118158
- https://bugzilla.redhat.com/show_bug.cgi?id=1118158
- ruby-cve20144975-bo(94706)
- ruby-cve20144975-bo(94706)
Modified: 2024-11-21
CVE-2014-8080
The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
- http://advisories.mageia.org/MGASA-2014-0443.html
- http://advisories.mageia.org/MGASA-2014-0443.html
- APPLE-SA-2015-09-30-3
- APPLE-SA-2015-09-30-3
- openSUSE-SU-2014:1589
- openSUSE-SU-2014:1589
- openSUSE-SU-2015:0002
- openSUSE-SU-2015:0002
- openSUSE-SU-2015:0007
- openSUSE-SU-2015:0007
- RHSA-2014:1911
- RHSA-2014:1911
- RHSA-2014:1912
- RHSA-2014:1912
- RHSA-2014:1913
- RHSA-2014:1913
- RHSA-2014:1914
- RHSA-2014:1914
- 61607
- 61607
- 62050
- 62050
- 62748
- 62748
- DSA-3157
- DSA-3157
- DSA-3159
- DSA-3159
- MDVSA-2015:129
- MDVSA-2015:129
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 70935
- 70935
- USN-2397-1
- USN-2397-1
- https://support.apple.com/HT205267
- https://support.apple.com/HT205267
- https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/
- https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/
Modified: 2024-11-21
CVE-2014-8090
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
- http://advisories.mageia.org/MGASA-2014-0472.html
- http://advisories.mageia.org/MGASA-2014-0472.html
- APPLE-SA-2015-09-30-3
- APPLE-SA-2015-09-30-3
- openSUSE-SU-2014:1589
- openSUSE-SU-2014:1589
- openSUSE-SU-2015:0002
- openSUSE-SU-2015:0002
- openSUSE-SU-2015:0007
- openSUSE-SU-2015:0007
- RHSA-2014:1911
- RHSA-2014:1911
- RHSA-2014:1912
- RHSA-2014:1912
- RHSA-2014:1913
- RHSA-2014:1913
- RHSA-2014:1914
- RHSA-2014:1914
- 59948
- 59948
- 62050
- 62050
- 62748
- 62748
- DSA-3157
- DSA-3157
- DSA-3159
- DSA-3159
- MDVSA-2015:129
- MDVSA-2015:129
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 71230
- 71230
- USN-2412-1
- USN-2412-1
- https://support.apple.com/HT205267
- https://support.apple.com/HT205267
- https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/
- https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/
Modified: 2024-11-21
CVE-2015-3900
RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack."
- http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html
- http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html
- FEDORA-2015-12501
- FEDORA-2015-12501
- FEDORA-2015-12574
- FEDORA-2015-12574
- FEDORA-2015-13157
- FEDORA-2015-13157
- RHSA-2015:1657
- RHSA-2015:1657
- [oss-security] 20150626 rubygems <2.4.8 vulnerable to DNS request hijacking (CVE-2015-3900 and CVE-2015-4020)
- [oss-security] 20150626 rubygems <2.4.8 vulnerable to DNS request hijacking (CVE-2015-3900 and CVE-2015-4020)
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- 75482
- 75482
- https://puppet.com/security/cve/CVE-2015-3900
- https://puppet.com/security/cve/CVE-2015-3900
- https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356
- https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356
- https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/
- https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/
Modified: 2024-11-21
CVE-2015-7551
The Fiddle::Handle implementation in ext/fiddle/handle.c in Ruby before 2.0.0-p648, 2.1 before 2.1.8, and 2.2 before 2.2.4, as distributed in Apple OS X before 10.11.4 and other products, mishandles tainting, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string, related to the DL module and the libffi library. NOTE: this vulnerability exists because of a CVE-2009-5147 regression.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796344
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796344
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796551
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796551
- APPLE-SA-2016-03-21-5
- APPLE-SA-2016-03-21-5
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 76060
- 76060
- RHSA-2018:0583
- RHSA-2018:0583
- https://github.com/ruby/ruby/commit/339e11a7f178312d937b7c95dd3115ce7236597a
- https://github.com/ruby/ruby/commit/339e11a7f178312d937b7c95dd3115ce7236597a
- https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-7551.html
- https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-7551.html
- https://puppet.com/security/cve/ruby-dec-2015-security-fixes
- https://puppet.com/security/cve/ruby-dec-2015-security-fixes
- https://support.apple.com/HT206167
- https://support.apple.com/HT206167
- https://www.ruby-lang.org/en/news/2015/12/16/unsafe-tainted-string-usage-in-fiddle-and-dl-cve-2015-7551/
- https://www.ruby-lang.org/en/news/2015/12/16/unsafe-tainted-string-usage-in-fiddle-and-dl-cve-2015-7551/
Modified: 2024-11-21
CVE-2015-9096
Net::SMTP in Ruby before 2.4.0 is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.
- http://www.mbsd.jp/Whitepaper/smtpi.pdf
- http://www.mbsd.jp/Whitepaper/smtpi.pdf
- https://github.com/ruby/ruby/commit/0827a7e52ba3d957a634b063bf5a391239b9ffee
- https://github.com/ruby/ruby/commit/0827a7e52ba3d957a634b063bf5a391239b9ffee
- https://github.com/rubysec/ruby-advisory-db/issues/215
- https://github.com/rubysec/ruby-advisory-db/issues/215
- https://hackerone.com/reports/137631
- https://hackerone.com/reports/137631
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- DSA-3966
- DSA-3966
Modified: 2024-11-21
CVE-2017-0898
Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap.
- 100862
- 100862
- 1039363
- 1039363
- RHSA-2017:3485
- RHSA-2017:3485
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0585
- RHSA-2018:0585
- https://github.com/mruby/mruby/issues/3722
- https://github.com/mruby/mruby/issues/3722
- https://hackerone.com/reports/212241
- https://hackerone.com/reports/212241
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- GLSA-201710-18
- GLSA-201710-18
- USN-3685-1
- USN-3685-1
- DSA-4031
- DSA-4031
- https://www.ruby-lang.org/en/news/2017/09/14/sprintf-buffer-underrun-cve-2017-0898/
- https://www.ruby-lang.org/en/news/2017/09/14/sprintf-buffer-underrun-cve-2017-0898/
Modified: 2024-11-21
CVE-2017-0899
RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications that include terminal escape characters. Printing the gem specification would execute terminal escape sequences.
- http://blog.rubygems.org/2017/08/27/2.6.13-released.html
- http://blog.rubygems.org/2017/08/27/2.6.13-released.html
- 100576
- 100576
- 1039249
- 1039249
- RHSA-2017:3485
- RHSA-2017:3485
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0585
- RHSA-2018:0585
- https://github.com/rubygems/rubygems/commit/1bcbc7fe637b03145401ec9c094066285934a7f1
- https://github.com/rubygems/rubygems/commit/1bcbc7fe637b03145401ec9c094066285934a7f1
- https://github.com/rubygems/rubygems/commit/ef0aa611effb5f54d40c7fba6e8235eb43c5a491
- https://github.com/rubygems/rubygems/commit/ef0aa611effb5f54d40c7fba6e8235eb43c5a491
- https://hackerone.com/reports/226335
- https://hackerone.com/reports/226335
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- GLSA-201710-01
- GLSA-201710-01
- DSA-3966
- DSA-3966
Modified: 2024-11-21
CVE-2017-0900
RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications to cause a denial of service attack against RubyGems clients who have issued a `query` command.
- http://blog.rubygems.org/2017/08/27/2.6.13-released.html
- http://blog.rubygems.org/2017/08/27/2.6.13-released.html
- 100579
- 100579
- 1039249
- 1039249
- RHSA-2017:3485
- RHSA-2017:3485
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0585
- RHSA-2018:0585
- https://github.com/rubygems/rubygems/commit/8a38a4fc24c6591e6c8f43d1fadab6efeb4d6251
- https://github.com/rubygems/rubygems/commit/8a38a4fc24c6591e6c8f43d1fadab6efeb4d6251
- https://hackerone.com/reports/243003
- https://hackerone.com/reports/243003
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- GLSA-201710-01
- GLSA-201710-01
- DSA-3966
- DSA-3966
Modified: 2024-11-21
CVE-2017-0901
RubyGems version 2.6.12 and earlier fails to validate specification names, allowing a maliciously crafted gem to potentially overwrite any file on the filesystem.
- http://blog.rubygems.org/2017/08/27/2.6.13-released.html
- http://blog.rubygems.org/2017/08/27/2.6.13-released.html
- 100580
- 100580
- 1039249
- 1039249
- RHSA-2017:3485
- RHSA-2017:3485
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0585
- RHSA-2018:0585
- https://github.com/rubygems/rubygems/commit/ad5c0a53a86ca5b218c7976765c0365b91d22cb2
- https://github.com/rubygems/rubygems/commit/ad5c0a53a86ca5b218c7976765c0365b91d22cb2
- https://hackerone.com/reports/243156
- https://hackerone.com/reports/243156
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- GLSA-201710-01
- GLSA-201710-01
- USN-3553-1
- USN-3553-1
- USN-3685-1
- USN-3685-1
- DSA-3966
- DSA-3966
- 42611
- 42611
Modified: 2024-11-21
CVE-2017-0902
RubyGems version 2.6.12 and earlier is vulnerable to a DNS hijacking vulnerability that allows a MITM attacker to force the RubyGems client to download and install gems from a server that the attacker controls.
- http://blog.rubygems.org/2017/08/27/2.6.13-released.html
- http://blog.rubygems.org/2017/08/27/2.6.13-released.html
- 100586
- 100586
- 1039249
- 1039249
- RHSA-2017:3485
- RHSA-2017:3485
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0585
- RHSA-2018:0585
- https://github.com/rubygems/rubygems/commit/8d91516fb7037ecfb27622f605dc40245e0f8d32
- https://github.com/rubygems/rubygems/commit/8d91516fb7037ecfb27622f605dc40245e0f8d32
- https://hackerone.com/reports/218088
- https://hackerone.com/reports/218088
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- GLSA-201710-01
- GLSA-201710-01
- USN-3553-1
- USN-3553-1
- USN-3685-1
- USN-3685-1
- DSA-3966
- DSA-3966
Modified: 2024-11-21
CVE-2017-0903
RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.
- http://blog.rubygems.org/2017/10/09/2.6.14-released.html
- http://blog.rubygems.org/2017/10/09/2.6.14-released.html
- http://blog.rubygems.org/2017/10/09/unsafe-object-deserialization-vulnerability.html
- http://blog.rubygems.org/2017/10/09/unsafe-object-deserialization-vulnerability.html
- 101275
- 101275
- RHSA-2017:3485
- RHSA-2017:3485
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0585
- RHSA-2018:0585
- https://github.com/rubygems/rubygems/commit/510b1638ac9bba3ceb7a5d73135dafff9e5bab49
- https://github.com/rubygems/rubygems/commit/510b1638ac9bba3ceb7a5d73135dafff9e5bab49
- https://hackerone.com/reports/274990
- https://hackerone.com/reports/274990
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- USN-3553-1
- USN-3553-1
- USN-3685-1
- USN-3685-1
- DSA-4031
- DSA-4031
Modified: 2024-11-21
CVE-2017-10784
The Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted user name.
- 100853
- 100853
- 1039363
- 1039363
- 1042004
- 1042004
- RHSA-2017:3485
- RHSA-2017:3485
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0585
- RHSA-2018:0585
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- GLSA-201710-18
- GLSA-201710-18
- USN-3528-1
- USN-3528-1
- USN-3685-1
- USN-3685-1
- DSA-4031
- DSA-4031
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/
- https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/
- https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/
Modified: 2024-11-21
CVE-2017-14033
The decode method in the OpenSSL::ASN1 module in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows attackers to cause a denial of service (interpreter crash) via a crafted string.
- 100868
- 100868
- 1039363
- 1039363
- 1042004
- 1042004
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0585
- RHSA-2018:0585
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- GLSA-201710-18
- GLSA-201710-18
- DSA-4031
- DSA-4031
- https://www.ruby-lang.org/en/news/2017/09/14/openssl-asn1-buffer-underrun-cve-2017-14033/
- https://www.ruby-lang.org/en/news/2017/09/14/openssl-asn1-buffer-underrun-cve-2017-14033/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/
Modified: 2024-11-21
CVE-2017-14064
Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a '\0' byte, returning a pointer to a string of length zero, which is not the length stored in space_len.
- 100890
- 100890
- 1039363
- 1039363
- 1042004
- 1042004
- RHSA-2017:3485
- RHSA-2017:3485
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0585
- RHSA-2018:0585
- https://bugs.ruby-lang.org/issues/13853
- https://bugs.ruby-lang.org/issues/13853
- https://github.com/flori/json/commit/8f782fd8e181d9cfe9387ded43a5ca9692266b85
- https://github.com/flori/json/commit/8f782fd8e181d9cfe9387ded43a5ca9692266b85
- https://hackerone.com/reports/209949
- https://hackerone.com/reports/209949
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- GLSA-201710-18
- GLSA-201710-18
- USN-3685-1
- USN-3685-1
- DSA-3966
- DSA-3966
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/
Modified: 2024-11-21
CVE-2017-17405
Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.
- 102204
- 102204
- 1042004
- 1042004
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0584
- RHSA-2018:0584
- RHSA-2018:0585
- RHSA-2018:0585
- RHSA-2019:2806
- RHSA-2019:2806
- [debian-lts-announce] 20171225 [SECURITY] [DLA 1222-1] ruby1.8 security update
- [debian-lts-announce] 20171225 [SECURITY] [DLA 1222-1] ruby1.8 security update
- [debian-lts-announce] 20171225 [SECURITY] [DLA 1221-1] ruby1.9.1 security update
- [debian-lts-announce] 20171225 [SECURITY] [DLA 1221-1] ruby1.9.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- DSA-4259
- DSA-4259
- 43381
- 43381
- https://www.ruby-lang.org/en/news/2017/12/14/net-ftp-command-injection-cve-2017-17405/
- https://www.ruby-lang.org/en/news/2017/12/14/net-ftp-command-injection-cve-2017-17405/
- https://www.ruby-lang.org/en/news/2017/12/14/ruby-2-4-3-released/
- https://www.ruby-lang.org/en/news/2017/12/14/ruby-2-4-3-released/
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-8073
WeeChat before 1.7.1 allows a remote crash by sending a filename via DCC to the IRC plugin. This occurs in the irc_ctcp_dcc_filename_without_quotes function during quote removal, with a buffer overflow.
- DSA-3836
- DSA-3836
- 97987
- 97987
- https://github.com/weechat/weechat/commit/2fb346f25f79e412cf0ed314fdf791763c19b70b
- https://github.com/weechat/weechat/commit/2fb346f25f79e412cf0ed314fdf791763c19b70b
- FEDORA-2020-4d232b48b8
- FEDORA-2020-4d232b48b8
- FEDORA-2020-db890b4800
- FEDORA-2020-db890b4800
- FEDORA-2020-d242130019
- FEDORA-2020-d242130019
- https://weechat.org/download/security/
- https://weechat.org/download/security/
- https://weechat.org/news/95/20170422-Version-1.7.1/
- https://weechat.org/news/95/20170422-Version-1.7.1/
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-7035
An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.
- RHSA-2016:2614
- RHSA-2016:2614
- RHSA-2016:2675
- RHSA-2016:2675
- [oss-security] 20161103 CVE-2016-7035 - pacemaker - improper IPC guarding
- [oss-security] 20161103 CVE-2016-7035 - pacemaker - improper IPC guarding
- 94214
- 94214
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7035
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7035
- https://github.com/ClusterLabs/pacemaker/commit/5d71e65049
- https://github.com/ClusterLabs/pacemaker/commit/5d71e65049
- [users] 20161103 [SECURITY] CVE-2016-7035 - pacemaker - improper IPC guarding
- [users] 20161103 [SECURITY] CVE-2016-7035 - pacemaker - improper IPC guarding
- GLSA-201710-08
- GLSA-201710-08
Closed bugs
не останавливается через systemd
Closed bugs
Не упакован pcsd
Пропущена зависимость для пакета pcs-pcsd
В процессе пакетирования испортился init файл
pcs не находит pcsd
В пакет pcs-pcsd не упакован unit файл для systemd