Vulnerability CVE-2017-0903: Information
Description
RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.
Severity: CRITICAL (9.8) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Fixed packages
Package name | Branch | Fixed in version | Version from repository | Errata ID | Task # | State |
---|---|---|---|---|---|---|
ruby | sisyphus | 2.4.2-alt2 | 3.1.4-alt4.4 | ALT-PU-2017-2419-1 | 190689 | Fixed |
ruby | p10 | 2.4.2-alt2 | 3.1.4-alt2.p10.1 | ALT-PU-2017-2419-1 | 190689 | Fixed |
ruby | p9 | 2.4.2-alt2 | 2.5.9-alt1 | ALT-PU-2017-2419-1 | 190689 | Fixed |
ruby | p8 | 2.4.2-alt1.M80P.1 | 2.5.1-alt0.M80P.1 | ALT-PU-2017-2422-1 | 190716 | Fixed |
ruby | c10f1 | 2.4.2-alt2 | 2.7.4-alt2.2.1 | ALT-PU-2017-2419-1 | 190689 | Fixed |
ruby | c9f2 | 2.4.2-alt2 | 2.7.6-alt0.1.c9f2 | ALT-PU-2017-2419-1 | 190689 | Fixed |
ruby | c7 | 2.4.3-alt0.M70C.1 | 2.4.4-alt0.M70C.1 | ALT-PU-2018-1228-1 | 200650 | Fixed |
ruby | p11 | 2.4.2-alt2 | 3.1.4-alt4.4 | ALT-PU-2017-2419-1 | 190689 | Fixed |
References to Advisories, Solutions, and Tools
Hyperlink | Resource |
---|---|
https://hackerone.com/reports/274990 |
|
https://github.com/rubygems/rubygems/commit/510b1638ac9bba3ceb7a5d73135dafff9e5bab49 |
|
http://blog.rubygems.org/2017/10/09/unsafe-object-deserialization-vulnerability.html |
|
http://blog.rubygems.org/2017/10/09/2.6.14-released.html |
|
101275 |
|
DSA-4031 |
|
RHSA-2017:3485 |
|
RHSA-2018:0378 |
|
USN-3553-1 |
|
RHSA-2018:0585 |
|
RHSA-2018:0583 |
|
USN-3685-1 |
|
[debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update |
|