ALT-PU-2017-2216-1
Closed vulnerabilities
BDU:2017-01780
Уязвимость функции parser_yyerror анализатора UTF-8-формата интерпретатора Ruby, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2017-02182
Уязвимость интерпретатора Ruby, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-02342
Уязвимость функции аутентификации библиотеки WEBrick, позволяющая нарушителю выполнить произвольные команды
Modified: 2024-11-21
CVE-2017-0898
Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap.
- 100862
- 100862
- 1039363
- 1039363
- RHSA-2017:3485
- RHSA-2017:3485
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0585
- RHSA-2018:0585
- https://github.com/mruby/mruby/issues/3722
- https://github.com/mruby/mruby/issues/3722
- https://hackerone.com/reports/212241
- https://hackerone.com/reports/212241
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- GLSA-201710-18
- GLSA-201710-18
- USN-3685-1
- USN-3685-1
- DSA-4031
- DSA-4031
- https://www.ruby-lang.org/en/news/2017/09/14/sprintf-buffer-underrun-cve-2017-0898/
- https://www.ruby-lang.org/en/news/2017/09/14/sprintf-buffer-underrun-cve-2017-0898/
Modified: 2024-11-21
CVE-2017-10784
The Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted user name.
- 100853
- 100853
- 1039363
- 1039363
- 1042004
- 1042004
- RHSA-2017:3485
- RHSA-2017:3485
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0585
- RHSA-2018:0585
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- GLSA-201710-18
- GLSA-201710-18
- USN-3528-1
- USN-3528-1
- USN-3685-1
- USN-3685-1
- DSA-4031
- DSA-4031
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/
- https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/
- https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/
Modified: 2024-11-21
CVE-2017-11465
The parser_yyerror function in the UTF-8 parser in Ruby 2.4.1 allows attackers to cause a denial of service (invalid write or read) or possibly have unspecified other impact via a crafted Ruby script, related to the parser_tokadd_utf8 function in parse.y. NOTE: this might have security relevance as a bypass of a $SAFE protection mechanism.
Modified: 2024-11-21
CVE-2017-14033
The decode method in the OpenSSL::ASN1 module in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows attackers to cause a denial of service (interpreter crash) via a crafted string.
- 100868
- 100868
- 1039363
- 1039363
- 1042004
- 1042004
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0585
- RHSA-2018:0585
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- GLSA-201710-18
- GLSA-201710-18
- DSA-4031
- DSA-4031
- https://www.ruby-lang.org/en/news/2017/09/14/openssl-asn1-buffer-underrun-cve-2017-14033/
- https://www.ruby-lang.org/en/news/2017/09/14/openssl-asn1-buffer-underrun-cve-2017-14033/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/
Modified: 2024-11-21
CVE-2017-14064
Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a '\0' byte, returning a pointer to a string of length zero, which is not the length stored in space_len.
- 100890
- 100890
- 1039363
- 1039363
- 1042004
- 1042004
- RHSA-2017:3485
- RHSA-2017:3485
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0585
- RHSA-2018:0585
- https://bugs.ruby-lang.org/issues/13853
- https://bugs.ruby-lang.org/issues/13853
- https://github.com/flori/json/commit/8f782fd8e181d9cfe9387ded43a5ca9692266b85
- https://github.com/flori/json/commit/8f782fd8e181d9cfe9387ded43a5ca9692266b85
- https://hackerone.com/reports/209949
- https://hackerone.com/reports/209949
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- GLSA-201710-18
- GLSA-201710-18
- USN-3685-1
- USN-3685-1
- DSA-3966
- DSA-3966
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/