Univention Bugzilla – Full Text Bug Listing |
Summary: | ruby2.1: Multiple issues (4.2) | ||
---|---|---|---|
Product: | UCS | Reporter: | Quality Assurance <qa> |
Component: | Security updates | Assignee: | Quality Assurance <qa> |
Status: | CLOSED FIXED | QA Contact: | Philipp Hahn <hahn> |
Severity: | normal | ||
Priority: | P3 | ||
Version: | UCS 4.2 | ||
Target Milestone: | UCS 4.2-4-errata | ||
Hardware: | All | ||
OS: | Linux | ||
What kind of report is it?: | Security Issue | What type of bug is this?: | --- |
Who will be affected by this bug?: | --- | How will those affected feel about the bug?: | --- |
User Pain: | Enterprise Customer affected?: | ||
School Customer affected?: | ISV affected?: | ||
Waiting Support: | Flags outvoted (downgraded) after PO Review: | ||
Ticket number: | Bug group (optional): | ||
Max CVSS v3 score: | 8.1 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) |
Description
Quality Assurance
2018-08-09 12:26:24 CEST
--- mirror/ftp/4.2/unmaintained/4.2-0/source/ruby2.1_2.1.5-2+deb8u3.dsc +++ apt/ucs_4.2-0-errata4.2-4/source/ruby2.1_2.1.5-2+deb8u4.dsc @@ -1,3 +1,48 @@ +2.1.5-2+deb8u4 [Fri, 13 Jul 2018 15:55:10 +0200] Santiago Ruano Rincón <santiagorr@riseup.net>: + + * Non-maintainer upload by the LTS Team. + * Fix multiple security issues: + * CVE-2015-9096: SMTP command injection via CRLF sequences + * CVE-2016-2339: Exploitable heap overflow in Fiddle::Function.new + (Closes: #851161) + * CVE-2016-7798: Fix IV Reuse in GCM Mode. + Patch by Kazuki Yamaguchi <k@rhe.jp> + * CVE-2017-0898: Buffer underrun vulnerability in Kernel.sprintf + * CVE-2017-10784: lib/webrick/log.rb: sanitize any type of logs + * CVE-2017-14033: asn1: fix out-of-bounds read in decoding + constructed objects + * CVE-2017-14064: Heap exposure vulnerability in generating JSON + * CVE-2017-0903: Whitelist classes and symbols that are in Gem spec + YAML + * Fix multiple vulnerabilities in rubygems: + - a DNS request hijacking vulnerability. (CVE-2017-0902) + - an ANSI escape sequence vulnerability. (CVE-2017-0899) + - a DoS vulnerability in the query command. (CVE-2017-0900) + - a vulnerability in the gem installer that allowed a malicious gem to + overwrite arbitrary files. (CVE-2017-0901) + * CVE-2017-17405: Command injection in Net::FTP + * CVE-2017-17790: Command injection in Hosts:new() by use of + Kernel#open + * CVE-2018-1000075: Strictly interpret octal fields in tar headers to + avoid infinite loop + * CVE-2018-1000076: Raise a security error when there are duplicate + files in a package + * CVE-2018-1000077: Enforce URL validation on spec homepage attribute. + * CVE-2018-1000078: Mitigate XSS vulnerability in homepage attribute + when displayed via gem server. + * CVE-2018-1000079: Directory Traversal vulnerability in gem + installation that can result in the gem could write to arbitrary + filesystem locations. + * CVE-2018-8778: Buffer under-read in String#unpack + * CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte + in Dir + * CVE-2018-6914: Unintentional file and directory creation with + directory traversal in tempfile and tmpdir + * CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in + UNIXServer and UNIXSocket + * CVE-2018-8777: DoS by large request in WEBrick + * CVE-2017-17742: HTTP response splitting in WEBrick + 2.1.5-2+deb8u3 [Tue, 07 Jun 2016 11:00:04 +0200] Petter Reinholdtsen <pere@debian.org>: * Non-maintainer upload to fix security problem. <http://10.200.17.11/4.2-4/#2965105212184781669> OK: yaml OK: errata-announce OK: patch OK: piuparts [4.2-4] c8d9e9ebbb Bug #47557: ruby2.1 2.1.5-2+deb8u4 doc/errata/staging/ruby2.1.yaml | 97 +++++++++++++++++------------------------ 1 file changed, 39 insertions(+), 58 deletions(-) [4.2-4] 13060ea579 Bug #47557: ruby2.1 2.1.5-2+deb8u4 doc/errata/staging/ruby2.1.yaml | 92 +++++++++++++++++++++++++++++++++++++++++ 1 file changed, 92 insertions(+) |