Skip to content

Commit a99cf12

Browse files
jasnowpostmodern
authored andcommitted
GHSA SYNC: 6 modified advisories
1 parent 627ae63 commit a99cf12

File tree

6 files changed

+71
-7
lines changed

6 files changed

+71
-7
lines changed

rubies/ruby/CVE-2008-1891.yml

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,8 @@
11
---
22
engine: ruby
33
cve: 2008-1891
4-
url: http://aluigi.altervista.org/adv/webrickcgi-adv.txt
4+
ghsa: rhf2-x48g-5wr7
5+
url: https://nvd.nist.gov/vuln/detail/CVE-2008-1891
56
title: Directory traversal vulnerability in WEBrick
67
date: 2008-04-15
78
description: |
@@ -19,3 +20,13 @@ patched_versions:
1920
- "~> 1.8.6.230"
2021
- "~> 1.8.7.22"
2122
- ">= 1.9.0.2"
23+
related:
24+
url:
25+
- https://nvd.nist.gov/vuln/detail/CVE-2008-1891
26+
- https://github.com/ruby/ruby/blob/ruby_1_9_1/ChangeLog
27+
- https://github.com/ruby/ruby/blob/ruby_1_8_7/ChangeLog
28+
- https://github.com/ruby/ruby/blob/ruby_1_8_6/ChangeLog
29+
- https://github.com/ruby/ruby/blob/ruby_1_8_5/ChangeLog
30+
- http://aluigi.altervista.org/adv/webrickcgi-adv.txt
31+
- http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
32+
- https://github.com/advisories/GHSA-rhf2-x48g-5wr7

rubies/ruby/CVE-2009-1904.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ patched_versions:
1818
related:
1919
url:
2020
- https://www.ruby-lang.org/en/news/2009/06/09/dos-vulnerability-in-bigdecimal
21+
- https://www.ruby-forum.com/t/ruby-1-8-6-pl369-released/169912
2122
- https://nvd.nist.gov/vuln/detail/CVE-2009-1904
2223
- https://github.com/advisories/GHSA-prwc-wj59-8vwr
2324
- http://www.osvdb.org/show/osvdb/55031

rubies/ruby/CVE-2011-3009.yml

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,8 @@
11
---
22
engine: ruby
33
cve: 2011-3009
4-
url: https://osdir.com/ml/lang-ruby-core/2011-01/msg00917.html
4+
ghsa: mg6g-jwh6-pwjf
5+
url: https://nvd.nist.gov/vuln/detail/CVE-2011-3009
56
title:
67
Ruby Properly initialize the random number generator when forking new process
78
date: 2011-07-02
@@ -15,3 +16,11 @@ unaffected_versions:
1516
- ">= 1.9.2"
1617
patched_versions:
1718
- ">= 1.8.6.114"
19+
related:
20+
url:
21+
- https://nvd.nist.gov/vuln/detail/CVE-2011-3009
22+
- https://bugzilla.redhat.com/show_bug.cgi?id=722415
23+
- http://rhn.redhat.com/errata/RHSA-2012-0070.html
24+
- https://security.snyk.io/vuln/SNYK-ORACLE6-RUBYLIBS-2462477
25+
- http://www.openwall.com/lists/oss-security/2011/07/20/1
26+
- https://github.com/advisories/GHSA-mg6g-jwh6-pwjf

rubies/ruby/CVE-2015-1855.yml

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,8 @@
11
---
22
engine: ruby
33
cve: 2015-1855
4-
url: https://www.ruby-lang.org/en/news/2015/04/13/ruby-openssl-hostname-matching-vulnerability/
4+
ghsa: 4x8v-74xf-h4g3
5+
url: https://nvd.nist.gov/vuln/detail/CVE-2015-1855
56
title: Ruby OpenSSL Hostname Verification
67
date: 2015-04-13
78
description: |
@@ -11,7 +12,18 @@ description: |
1112
follows more strict behavior, as recommended by these RFCs. In particular,
1213
matching of more than one wildcard per subject/SAN is no-longer allowed. As well,
1314
comparison of these values is now case-insensitive.
15+
cvss_v2: 4.3
16+
cvss_v3: 5.9
1417
patched_versions:
1518
- "~> 2.0.0.645"
1619
- "~> 2.1.6"
1720
- ">= 2.2.2"
21+
related:
22+
url:
23+
- https://nvd.nist.gov/vuln/detail/CVE-2015-1855
24+
- https://www.ruby-lang.org/en/news/2015/04/13/ruby-openssl-hostname-matching-vulnerability
25+
- https://bugs.ruby-lang.org/issues/9644
26+
- http://www.debian.org/security/2015/dsa-3245
27+
- http://www.debian.org/security/2015/dsa-3246
28+
- http://www.debian.org/security/2015/dsa-3247
29+
- https://github.com/advisories/GHSA-4x8v-74xf-h4g3

rubies/ruby/CVE-2017-17405.yml

Lines changed: 22 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,8 @@
11
---
22
engine: ruby
33
cve: 2017-17405
4-
url: https://www.ruby-lang.org/en/news/2017/12/14/net-ftp-command-injection-cve-2017-17405/
4+
ghsa: https://github.com/advisories/GHSA-q23r-c9rf-97q3
5+
url: https://nvd.nist.gov/vuln/detail/CVE-2017-17405
56
title: Command injection vulnerability in Net::FTP
67
date: 2017-12-14
78
description: |
@@ -15,8 +16,28 @@ description: |
1516
command execution.
1617
1718
All users running an affected release should upgrade immediately.
19+
cvss_v2: 9.3
20+
cvss_v3: 8.8
1821
patched_versions:
1922
- "~> 2.2.9"
2023
- "~> 2.3.6"
2124
- "~> 2.4.3"
2225
- "> 2.5.0.preview.1"
26+
related:
27+
url:
28+
- https://nvd.nist.gov/vuln/detail/CVE-2017-17405
29+
- https://www.ruby-lang.org/en/news/2017/12/14/ruby-2-4-3-released
30+
- https://www.ruby-lang.org/en/news/2017/12/14/ruby-2-3-6-released
31+
- https://www.ruby-lang.org/en/news/2017/12/14/ruby-2-2-9-released
32+
- https://www.ruby-lang.org/en/news/2017/12/14/net-ftp-command-injection-cve-2017-17405
33+
- https://www.exploit-db.com/exploits/43381
34+
- https://lists.debian.org/debian-security-announce/2018/msg00188.html
35+
- https://lists.debian.org/debian-lts-announce/2017/12/msg00024.html
36+
- https://lists.debian.org/debian-lts-announce/2017/12/msg00025.html
37+
- https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
38+
- https://access.redhat.com/errata/RHSA-2018:0378
39+
- https://access.redhat.com/errata/RHSA-2018:0583
40+
- https://access.redhat.com/errata/RHSA-2018:0584
41+
- https://access.redhat.com/errata/RHSA-2018:0585
42+
- https://access.redhat.com/errata/RHSA-2019:2806
43+
- https://github.com/advisories/GHSA-q23r-c9rf-97q3

rubies/ruby/CVE-2020-10933.yml

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,8 @@
11
---
22
engine: ruby
33
cve: 2020-10933
4-
url: https://www.ruby-lang.org/en/news/2020/03/31/heap-exposure-in-socket-cve-2020-10933/
4+
ghsa: g5hm-28jr-53fh
5+
url: https://nvd.nist.gov/vuln/detail/CVE-2020-10933
56
title: Heap exposure vulnerability in the socket library
67
date: 2020-03-31
78
description: |
@@ -17,9 +18,18 @@ description: |
1718
1819
This issue is exploitable only on Linux. This issue had been since Ruby
1920
2.5.0; 2.4 series is not vulnerable.
21+
cvss_v2: 5.0
22+
cvss_v3: 5.3
23+
unaffected_versions:
24+
- "~> 2.4.0"
2025
patched_versions:
2126
- "~> 2.5.8"
2227
- "~> 2.6.6"
2328
- ">= 2.7.1"
24-
unaffected_versions:
25-
- "~> 2.4.0"
29+
related:
30+
url:
31+
- https://nvd.nist.gov/vuln/detail/CVE-2020-10933
32+
- https://lists.debian.org/debian-security-announce/2020/msg00126.html
33+
- https://security.netapp.com/advisory/ntap-20200625-0001
34+
- https://www.ruby-lang.org/en/news/2020/03/31/heap-exposure-in-socket-cve-2020-10933
35+
- https://github.com/advisories/GHSA-g5hm-28jr-53fh

0 commit comments

Comments
 (0)